vulnerability

Amazon Linux AMI 2: CVE-2019-6109: Security patch for openssh (ALAS-2019-1216)

Severity
4
CVSS
(AV:N/AC:H/Au:N/C:P/I:P/A:N)
Published
Jan 31, 2019
Added
Apr 27, 2020
Modified
Nov 27, 2024

Description

An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.

Solution(s)

amazon-linux-ami-2-upgrade-opensshamazon-linux-ami-2-upgrade-openssh-askpassamazon-linux-ami-2-upgrade-openssh-cavsamazon-linux-ami-2-upgrade-openssh-clientsamazon-linux-ami-2-upgrade-openssh-debuginfoamazon-linux-ami-2-upgrade-openssh-keycatamazon-linux-ami-2-upgrade-openssh-ldapamazon-linux-ami-2-upgrade-openssh-serveramazon-linux-ami-2-upgrade-openssh-server-sysvinitamazon-linux-ami-2-upgrade-pam_ssh_agent_auth
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.