Vulnerability Details : CVE-2019-6109
An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
Exploit prediction scoring system (EPSS) score for CVE-2019-6109
Probability of exploitation activity in the next 30 days: 0.15%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 50 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2019-6109
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:N |
4.9
|
4.9
|
[email protected] |
6.8
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N |
1.6
|
5.2
|
[email protected] |
CWE ids for CVE-2019-6109
-
The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.Assigned by: [email protected] (Primary)
References for CVE-2019-6109
-
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
Release Notes;Vendor Advisory
-
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
Third Party Advisory
-
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Patch;Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20190213-0001/
Third Party Advisory
-
https://security.gentoo.org/glsa/201903-16
Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html
Broken Link
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/
Mailing List;Third Party Advisory
-
https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
Release Notes;Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2019:3702
Third Party Advisory
-
https://usn.ubuntu.com/3885-1/
Third Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
Patch;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
Mailing List;Third Party Advisory
-
https://www.debian.org/security/2019/dsa-4387
Third Party Advisory
Products affected by CVE-2019-6109
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x204rna_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x204rna_eec_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:a:winscp:winscp:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:ontap_select_deploy:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*