CVE-2019-6109

Published: 14 January 2019

An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.

Priority

Medium

CVSS 3 base score: 6.8

Status

Package Release Status
openssh
Launchpad, Ubuntu, Debian
Upstream
Released (1:7.9p1-6, 1:6.7p1-5+deb8y8, 1:7.4p1-10+deb9u4)
Ubuntu 21.04 (Hirsute Hippo)
Released (1:7.9p1-6)
Ubuntu 20.10 (Groovy Gorilla)
Released (1:7.9p1-6)
Ubuntu 20.04 LTS (Focal Fossa)
Released (1:7.9p1-6)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (1:7.6p1-4ubuntu0.2)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (1:7.2p2-4ubuntu2.7)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1:6.6p1-2ubuntu2.12)
Patches:
Upstream: https://github.com/openssh/openssh-portable/commit/8976f1c4b2721c26e878151f52bdf346dfe2d54c
Upstream: https://github.com/openssh/openssh-portable/commit/bdc6c63c80b55bcbaa66b5fde31c1cb1d09a41eb
openssh-ssh1
Launchpad, Ubuntu, Debian
Upstream Ignored
(frozen on openssh 7.5p)
Ubuntu 21.04 (Hirsute Hippo) Needs triage

Ubuntu 20.10 (Groovy Gorilla) Needs triage

Ubuntu 20.04 LTS (Focal Fossa) Needs triage

Ubuntu 18.04 LTS (Bionic Beaver) Needs triage

Ubuntu 16.04 ESM (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Notes

AuthorNote
seth-arnold
openssh-ssh1 is provided for compatibility with old devices that
cannot be upgraded to modern protocols. Thus we may not provide security
support for this package if doing so would prevent access to equipment.
mdeslaur
The recommended workaround for this issue is to switch to using
sftp instead of scp.

The updates in USN-3885-1 inverted two CVE numbers by accident.

References

Bugs