Vulnerability Description
In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openbsd | Openssh | <= 7.9 |
| Winscp | Winscp | <= 5.13 |
| Netapp | Element Software | - |
| Netapp | Ontap Select Deploy | - |
| Netapp | Storage Automation Store | - |
| Siemens | Scalance X204Rna Firmware | < 3.2.7 |
| Siemens | Scalance X204Rna | - |
| Siemens | Scalance X204Rna Eec Firmware | < 3.2.7 |
| Siemens | Scalance X204Rna Eec | - |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdfPatchThird Party Advisory
- https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.cRelease Notes
- https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.cRelease Notes
- https://security.gentoo.org/glsa/201903-16Third Party Advisory
- https://security.netapp.com/advisory/ntap-20190213-0001/Third Party Advisory
- https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txtThird Party Advisory
- https://www.exploit-db.com/exploits/46193/ExploitThird Party AdvisoryVDB Entry
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdfPatchThird Party Advisory
- https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.cRelease Notes
- https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.cRelease Notes
- https://security.gentoo.org/glsa/201903-16Third Party Advisory
- https://security.netapp.com/advisory/ntap-20190213-0001/Third Party Advisory
- https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txtThird Party Advisory
- https://www.exploit-db.com/exploits/46193/ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2019-6110?
CVE-2019-6110 is a vulnerability with a CVSS score of 6.8 (MEDIUM). In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI co...
How severe is CVE-2019-6110?
CVE-2019-6110 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-6110?
Check the references section above for vendor advisories and patch information. Affected products include: Openbsd Openssh, Winscp Winscp, Netapp Element Software, Netapp Ontap Select Deploy, Netapp Storage Automation Store.