Inappropriate Encoding for Output Context

Affecting openssh package, versions <0.0.0

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.

References

CVSS Score

6.8
low severity
  • Attack Vector
    Network
  • Attack Complexity
    High
  • Privileges Required
    None
  • User Interaction
    Required
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    None
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:F
CVE
CVE-2019-6110
CWE
CWE-838
Snyk ID
SNYK-UBUNTU1804-OPENSSH-369024
Disclosed
31 Jan, 2019
Published
15 Jan, 2019