OpenSSH 7.9 Vulnerability: Manipulation of Client Output via Crafted Object Names

OpenSSH 7.9 Vulnerability: Manipulation of Client Output via Crafted Object Names

CVE-2019-6109 · MEDIUM Severity

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.

Learn more about our Cis Benchmark Audit For Server Software.