CVE-2019-14889

Publication date 10 December 2019

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

8.8 · High

Score breakdown

A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

Status

Package Ubuntu Release Status
libssh 19.10 eoan
Fixed 0.9.0-1ubuntu1.3
19.04 disco
Fixed 0.8.6-3ubuntu0.3
18.04 LTS bionic
Fixed 0.8.0~20170825.94fa1e38-1ubuntu0.5
16.04 LTS xenial
Fixed 0.6.3-4.3ubuntu0.5
14.04 LTS trusty Not in release

Severity score breakdown

Parameter Value
Base score 8.8 · High
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-4219-1
    • libssh vulnerability
    • 10 December 2019

Other references