Executive Summary

Summary
Titleopenssh security update
Informations
NameDSA-4387First vendor Publication2019-02-09
VendorDebianLast vendor Modification2019-03-02
Severity (Vendor) N/ARevision2

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:P)
Cvss Base Score5.8Attack RangeNetwork
Cvss Impact Score4.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

It was found that a security update (DSA-4387-1) of OpenSSH, an implementation of the SSH protocol suite, was incomplete. This update did not completely fix CVE-2019-6111, an arbitrary file overwrite vulnerability in the scp client implementing the SCP protocol.

For the stable distribution (stretch), this problem has been fixed in version 1:7.4p1-10+deb9u6.

We recommend that you upgrade your openssh packages.

For the detailed security status of openssh please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openssh

Original Source

Url : http://www.debian.org/security/2019/dsa-4387

CWE : Common Weakness Enumeration

%idName
67 %CWE-284Access Control (Authorization) Issues
33 %CWE-20Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1
Application1
Application1
Application1
Application1
Application135
Application49
Os4
Os2
Os1

Nessus® Vulnerability Scanner

DateDescription
2019-01-16Name : The remote Fedora host is missing a security update.
File : fedora_2019-f6ff819834.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
DateInformations
2019-03-02 17:18:14
  • Multiple Updates
2019-02-20 12:12:10
  • Multiple Updates
2019-02-09 17:18:25
  • First insertion