[MacPorts] #56216: openssh: update to 7.9p1 (was: openssh: update to 7.7p1)

MacPorts noreply at macports.org
Mon Jan 14 10:48:14 UTC 2019


#56216: openssh: update to 7.9p1
----------------------+----------------------
  Reporter:  l2dy     |      Owner:  (none)
      Type:  update   |     Status:  new
  Priority:  Normal   |  Milestone:
 Component:  ports    |    Version:
Resolution:           |   Keywords:  security
      Port:  openssh  |
----------------------+----------------------
Changes (by l2dy):

 * keywords:   => security


Old description:



New description:

 https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt

 Vulnerabilities
 ---------------

 1. CWE-20: scp client improper directory name validation [CVE-2018-20685]

 The scp client allows server to modify permissions of the target directory
 by using empty
 ("D0777 0 \n") or dot ("D0777 0 .\n") directory name.


 2. CWE-20: scp client missing received object name validation
 [CVE-2019-6111]

 Due to the scp implementation being derived from 1983 rcp [1], the server
 chooses which
 files/directories are sent to the client. However, scp client only perform
 cursory
 validation of the object name returned (only directory traversal attacks
 are prevented).
 A malicious scp server can overwrite arbitrary files in the scp client
 target directory.
 If recursive operation (-r) is performed, the server can manipulate
 subdirectories
 as well (for example overwrite .ssh/authorized_keys).

 The same vulnerability in WinSCP is known as CVE-2018-20684.


 3. CWE-451: scp client spoofing via object name [CVE-2019-6109]

 Due to missing character encoding in the progress display, the object name
 can be used
 to manipulate the client output, for example to employ ANSI codes to hide
 additional
 files being transferred.


 4. CWE-451: scp client spoofing via stderr [CVE-2019-6110]

 Due to accepting and displaying arbitrary stderr output from the scp
 server, a
 malicious server can manipulate the client output, for example to employ
 ANSI codes
 to hide additional files being transferred.

--

-- 
Ticket URL: <https://trac.macports.org/ticket/56216#comment:4>
MacPorts <https://www.macports.org/>
Ports system for macOS


More information about the macports-tickets mailing list