Description
The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
Published: 2017-10-26
Score: 5.3 Medium
EPSS: 3.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1500-1 openssh security update
EUVD EUVD EUVD-2017-7325 The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
Ubuntu USN Ubuntu USN USN-3538-1 OpenSSH vulnerabilities
History

No history.

Subscriptions

Debian Debian Linux
Netapp Active Iq Unified Manager Cloud Backup Clustered Data Ontap Cn1610 Cn1610 Firmware Data Ontap Edge Hci Management Node Oncommand Unified Manager Core Package Solidfire Steelstore Cloud Integrated Storage Storage Replication Adapter For Clustered Data Ontap Vasa Provider For Clustered Data Ontap Virtual Storage Console
Openbsd Openssh
Oracle Sun Zfs Storage Appliance Kit
Redhat Enterprise Linux Enterprise Linux Desktop Enterprise Linux Eus Enterprise Linux Server Enterprise Linux Server Aus Enterprise Linux Server Tus Enterprise Linux Workstation
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T20:04:50.496Z

Reserved: 2017-10-25T00:00:00.000Z

Link: CVE-2017-15906

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-10-26T03:29:00.220

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-15906

cve-icon Redhat

Severity : Low

Publid Date: 2017-10-03T00:00:00Z

Links: CVE-2017-15906 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses