Executive Summary

This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Title OpenSSH vulnerability
Name USN-3885-2 First vendor Publication 2019-03-04
Vendor Ubuntu Last vendor Modification 2019-03-04
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:P)
Cvss Base Score 5.8 Attack Range Network
Cvss Impact Score 4.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.10 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS


One of the fixes in USN-3885-1 was incomplete.

Software Description: - openssh: secure shell (SSH) for secure access to remote machines


USN-3885-1 fixed vulnerabilities in OpenSSH. It was discovered that the fix for CVE-2019-6111 turned out to be incomplete. This update fixes the problem.

Original advisory details:

Harry Sintonen discovered multiple issues in the OpenSSH scp utility. If a
user or automated system were tricked into connecting to an untrusted
server, a remote attacker could possibly use these issues to write to
arbitrary files, change directory permissions, and spoof client output.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.10:
openssh-client 1:7.7p1-4ubuntu0.3

Ubuntu 18.04 LTS:
openssh-client 1:7.6p1-4ubuntu0.3

Ubuntu 16.04 LTS:
openssh-client 1:7.2p2-4ubuntu2.8

Ubuntu 14.04 LTS:
openssh-client 1:6.6p1-2ubuntu2.13

In general, a standard system update will make all the necessary changes.


Package Information:

Original Source

Url : http://www.ubuntu.com/usn/USN-3885-2

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

Application 176
Application 44
Os 4
Os 2
Os 1

Alert History

If you want to see full details history, please login or register.
Date Informations
2019-03-04 21:19:05
  • First insertion