OpenSSH < 3.4p1 scp Traversal Arbitrary File Overwrite

medium Nessus Plugin ID 17701
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 4.2

Synopsis

A file transfer client on the remote host could be abused to overwrite arbitrary files.

Description

According to its banner, the version of OpenSSH running on the remote host is earlier than version 3.4p1. Such versions contain an arbitrary file overwrite vulnerability that could allow a malicious SSH server to cause the supplied scp utility to write to arbitrary files outside of the current directory.

Solution

Upgrade to OpenSSH 3.4p1 or later.

See Also

http://www.juniper.net/support/security/alerts/adv59739.txt

https://bugzilla.redhat.com/show_bug.cgi?id=120147

http://www.nessus.org/u?5cc380af

Plugin Details

Severity: Medium

ID: 17701

File Name: openssh_34p1.nasl

Version: 1.6

Type: remote

Family: Misc.

Published: 11/18/2011

Updated: 7/16/2018

Dependencies: ssh_detect.nasl

Risk Information

Risk Factor: Medium

VPR Score: 4.2

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:openbsd:openssh

Required KB Items: Settings/PCI_DSS

Exploit Ease: No known exploits are available

Patch Publication Date: 4/1/2004

Vulnerability Publication Date: 4/6/2004

Reference Information

CVE: CVE-2004-0175

BID: 9986

CWE: 22