The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Openssh | Openbsd | * | 7.6 (excluding) |
Red Hat Enterprise Linux 7 | RedHat | openssh-0:7.4p1-16.el7 | * |
Openssh | Ubuntu | artful | * |
Openssh | Ubuntu | bionic | * |
Openssh | Ubuntu | cosmic | * |
Openssh | Ubuntu | devel | * |
Openssh | Ubuntu | disco | * |
Openssh | Ubuntu | eoan | * |
Openssh | Ubuntu | focal | * |
Openssh | Ubuntu | groovy | * |
Openssh | Ubuntu | hirsute | * |
Openssh | Ubuntu | precise/esm | * |
Openssh | Ubuntu | trusty | * |
Openssh | Ubuntu | upstream | * |
Openssh | Ubuntu | xenial | * |
Openssh | Ubuntu | zesty | * |