• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
REWTERZ THREAT ALERT -Reverse RDP Attacks by Major Protocol Issues
February 6, 2019
REWTERZ THREAT ALERT – New SpeakUp Backdoor Infects Linux and macOS with Miners in East Asia
February 7, 2019

Rewterz Threat Advisory – CVE-2019-6111 – OpenSSH Arbitrary File Overwrite Vulnerability

February 7, 2019

Severity

Medium

Category

Vulnerability

Analysis Summary

The vulnerability lies in the design of Secure Copy Protocol (SCP) tools and can be exploited by malicious servers to unexpectedly alter victims’ files on their client machines, in the context of the user running the affected application.

Exploitation of this vulnerability by a malicious SCP Server isn’t limited to alteration of the files which you fetched, but also expands to changing of access permissions, or downloading of extra documents. The SCP client fails to thoroughly check whether it’s getting the expected objects or not, which can be exploited by attackers to overwrite the user’s .bash_aliases file. This, in turn, would allow the attacker to run arbitrary commands on the victim’s device when they do routine stuff, like list a directory.

However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented), while the server chooses which files/directories are sent to the client. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).

OpenSSH 7.9 and prior versions are vulnerable. This issue affects the scp client shipped with openssh. The SSH protocol or the SSH client is not affected.

Impact

Changing of Access Permissions

Unauthorized File Downloads

Affected Products

OpenSSH 7.9 and prior

Remediation

Find a quick patch by sintonen in the link below: https://sintonen.fi/advisories/scp-name-validator.patch A vendor patch is still not available.

  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.