CVE-2020-12062

Priority
Description
** DISPUTED ** The scp client in OpenSSH 8.2 incorrectly sends duplicate
responses to the server upon a utimes system call failure, which allows a
malicious unprivileged user on the remote server to overwrite arbitrary
files in the client's download directory by creating a crafted subdirectory
anywhere on the remote server. The victim must use the command scp -rp to
download a file hierarchy containing, anywhere inside, this crafted
subdirectory. NOTE: the vendor points out that "this attack can achieve no
more than a hostile peer is already able to achieve within the scp
protocol" and "utimes does not fail under normal circumstances."
Notes
sarnoldopenssh-ssh1 is provided for compatibility with old devices that
cannot be upgraded to modern protocols. Thus we may not provide security
support for this package if doing so would prevent access to equipment.
mdeslaurthis issue has been disputed as being a security issue, we will
not be fixing this issue in Ubuntu.
Package
Upstream:ignored (frozen on openssh 7.5p)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):ignored
Ubuntu 20.04 LTS (Focal Fossa):ignored
Ubuntu 20.10 (Groovy Gorilla):ignored
More Information

Updated: 2020-09-10 06:35:48 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)