vulnerability
CentOS Linux: CVE-2019-6109: Moderate: openssh security, bug fix, and enhancement update (CESA-2019:3702)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:H/Au:N/C:P/I:P/A:N) | Jan 31, 2019 | Nov 6, 2019 | May 25, 2023 |
Severity
4
CVSS
(AV:N/AC:H/Au:N/C:P/I:P/A:N)
Published
Jan 31, 2019
Added
Nov 6, 2019
Modified
May 25, 2023
Description
An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
Solution(s)
centos-upgrade-opensshcentos-upgrade-openssh-askpasscentos-upgrade-openssh-askpass-debuginfocentos-upgrade-openssh-cavscentos-upgrade-openssh-cavs-debuginfocentos-upgrade-openssh-clientscentos-upgrade-openssh-clients-debuginfocentos-upgrade-openssh-debuginfocentos-upgrade-openssh-debugsourcecentos-upgrade-openssh-keycatcentos-upgrade-openssh-keycat-debuginfocentos-upgrade-openssh-ldapcentos-upgrade-openssh-ldap-debuginfocentos-upgrade-openssh-servercentos-upgrade-openssh-server-debuginfocentos-upgrade-pam_ssh_agent_authcentos-upgrade-pam_ssh_agent_auth-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.