|Category:||Huawei EulerOS Local Security Checks|
|Title:||Huawei EulerOS: Security Advisory for openssh (EulerOS-SA-2020-2451)|
|Summary:||The remote host is missing an update for the Huawei EulerOS; 'openssh' package(s) announced via the EulerOS-SA-2020-2451 advisory.|
The remote host is missing an update for the Huawei EulerOS
'openssh' package(s) announced via the EulerOS-SA-2020-2451 advisory.
The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client's download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that 'this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol' and 'utimes does not fail under normal circumstances.'(CVE-2020-12062)
'openssh' package(s) on Huawei EulerOS Virtualization 220.127.116.11.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2020-12062|
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.