SB2019030120 - Spoofing attack in openssh (Alpine package)
Published: March 1, 2019
Security Bulletin ID
SB2019030120
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Data manipulation
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Spoofing attack (CVE-ID: CVE-2019-6109)
The vulnerability allows a remote attacker to conduct spoofing attack on the target system.The weakness exists due to accepting and displaying arbitrary stderr output from the scp server by the scp client. A malicious SCP server can use the object name to manipulate the client output, for example to employ ANSI codes to hide additional files being transferred.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=07fc0a9367151053d9b6e8ab68fdb3c7501a4873
- https://git.alpinelinux.org/aports/commit/?id=cfa04666c50b8dfbe34b6ac8e6b177add54ce649
- https://git.alpinelinux.org/aports/commit/?id=12d219e7e12c5bdf2e11ba8e9f10d32843259777
- https://git.alpinelinux.org/aports/commit/?id=6df59aea4486cca6f0c089f72e404ee097b49a02
- https://git.alpinelinux.org/aports/commit/?id=9730fd967a164b246d18cab2dede31af43c83f08
- https://git.alpinelinux.org/aports/commit/?id=e231e6bed510c2304f37093f0eadb5708da9728e