Lucene search

K
f5F5F5:K12252011
HistoryJan 17, 2019 - 12:00 a.m.

K12252011 : OpenSSH vulnerability CVE-2019-6109

2019-01-1700:00:00
my.f5.com
43

6.2 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.9%

Security Advisory Description

An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c. (CVE-2019-6109)

Impact

Missing character encoding in the progress display allows for spoofing of OpenSSH SCP client output.