Korean
<< Back
VID 14126
Severity 30
Port 22
Protocol TCP
Class SSH
Detailed Description According to its banner, the version of OpenSSH running on the remote host is prior to 7.6. It is, therefore, affected by a file creation restriction bypass vulnerability related to the 'process_open' function in the file 'sftp-server.c' that allows authenticated users to create zero-length files regardless of configuration.

* References:
http://www.openssh.com/txt/release-7.6
https://github.com/openbsd/src/commit/a6981567e8e215acc1ef690c8dbb30f2d9b00a19#diff-8b99aa649abd796be7cc465d6f0a2f96
https://github.com/openssh/openssh-portable/commit/4d827f0d75a53d3952288ab882efbddea7ffadfe#diff-066c02faff81900a14a658dae29b3e15

* Platforms Affected:
OpenSSH version before 7.6
Any operating system Any version
Recommendation Upgrade to the latest version of OpenSSH (7.6 or later), available from the OpenSSH Web site at http://www.openssh.org/
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)