CVE-2019-6111

Priority
Description
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being
derived from 1983 rcp, the server chooses which files/directories are sent
to the client. However, the scp client only performs cursory validation of
the object name returned (only directory traversal attacks are prevented).
A malicious scp server (or Man-in-The-Middle attacker) can overwrite
arbitrary files in the scp client target directory. If recursive operation
(-r) is performed, the server can manipulate subdirectories as well (for
example, to overwrite the .ssh/authorized_keys file).
Assigned-to
mdeslaur
Notes
sarnoldopenssh-ssh1 is provided for compatibility with old devices that
cannot be upgraded to modern protocols. Thus we may not provide security
support for this package if doing so would prevent access to equipment.
mdeslaurThe recommended workaround for this issue is to switch to using
sftp instead of scp.

The updates in USN-3885-1 inverted two CVE numbers by accident.

The initial USN was incomplete and did not include the second
commit.
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 ESM (Trusty Tahr):released (1:6.6p1-2ubuntu2.13)
Ubuntu 16.04 LTS (Xenial Xerus):released (1:7.2p2-4ubuntu2.8)
Ubuntu 18.04 LTS (Bionic Beaver):released (1:7.6p1-4ubuntu0.3)
Ubuntu 19.10 (Eoan Ermine):not-affected (1:7.9p1-10)
Ubuntu 20.04 (Focal Fossa):not-affected (1:7.9p1-10)
Patches:
Upstream:https://github.com/openssh/openssh-portable/commit/391ffc4b9d31fa1f4ad566499fef9176ff8a07dc
Upstream:https://github.com/openssh/openssh-portable/commit/3d896c157c722bc47adca51a58dca859225b5874
Package
Upstream:ignored (frozen on openssh 7.5p)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 19.10 (Eoan Ermine):needs-triage
Ubuntu 20.04 (Focal Fossa):needs-triage
More Information

Updated: 2020-04-24 03:57:15 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)