CVE-2019-14889

Priority
Description
A flaw was found with the libssh API function ssh_scp_new() in versions
before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a
server, the scp command, which includes a user-provided path, is executed
on the server-side. In case the library is used in a way where users can
influence the third parameter of the function, it would become possible for
an attacker to inject arbitrary commands, leading to a compromise of the
remote target.
Assigned-to
mdeslaur
Notes
Package
Upstream:released (0.8.8,0.9.3)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (0.6.3-4.3ubuntu0.5)
Ubuntu 18.04 LTS (Bionic Beaver):released (0.8.0~20170825.94fa1e38-1ubuntu0.5)
Ubuntu 19.04 (Disco Dingo):released (0.8.6-3ubuntu0.3)
Ubuntu 19.10 (Eoan Ermine):released (0.9.0-1ubuntu1.3)
Ubuntu 20.04 (Focal Fossa):released (0.9.0-1ubuntu5)
More Information

Updated: 2019-12-11 19:14:59 UTC (commit a81c61a077b6a2e974571e58183d641a11119294)