CVE-2019-14889

Priority
Description
A flaw was found with the libssh API function ssh_scp_new() in versions
before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a
server, the scp command, which includes a user-provided path, is executed
on the server-side. In case the library is used in a way where users can
influence the third parameter of the function, it would become possible for
an attacker to inject arbitrary commands, leading to a compromise of the
remote target.
Assigned-to
mdeslaur
Notes
Package
Upstream:released (0.8.8,0.9.3)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (0.6.3-4.3ubuntu0.5)
Ubuntu 18.04 LTS (Bionic Beaver):released (0.8.0~20170825.94fa1e38-1ubuntu0.5)
Ubuntu 20.04 LTS (Focal Fossa):released (0.9.0-1ubuntu5)
More Information

Updated: 2020-07-28 20:06:45 UTC (commit d26b6ca9f5b3adb89bb036ce73ae7dab894935ec)