OpenSSH < 3.4p1 scp Traversal Arbitrary File Overwrite

medium Nessus Plugin ID 17701

Synopsis

A file transfer client on the remote host could be abused to overwrite arbitrary files.

Description

According to its banner, the version of OpenSSH running on the remote host is earlier than version 3.4p1. Such versions contain an arbitrary file overwrite vulnerability that could allow a malicious SSH server to cause the supplied scp utility to write to arbitrary files outside of the current directory.

Solution

Upgrade to OpenSSH 3.4p1 / 3.4 or later.

See Also

http://www.juniper.net/support/security/alerts/adv59739.txt

https://bugzilla.redhat.com/show_bug.cgi?id=120147

http://www.nessus.org/u?5cc380af

Plugin Details

Severity: Medium

ID: 17701

File Name: openssh_34p1.nasl

Version: 1.7

Type: remote

Family: Misc.

Published: 11/18/2011

Updated: 3/27/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:openbsd:openssh

Required KB Items: installed_sw/OpenSSH, Settings/PCI_DSS

Exploit Ease: No known exploits are available

Patch Publication Date: 4/1/2004

Vulnerability Publication Date: 4/6/2004

Reference Information

CVE: CVE-2004-0175

BID: 9986

CWE: 22