The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Netapp
Subscribe
|
Active Iq Unified Manager
Subscribe
Cloud Backup
Subscribe
Clustered Data Ontap
Subscribe
Cn1610
Subscribe
Cn1610 Firmware
Subscribe
Data Ontap Edge
Subscribe
Hci Management Node
Subscribe
Oncommand Unified Manager Core Package
Subscribe
Solidfire
Subscribe
Steelstore Cloud Integrated Storage
Subscribe
Storage Replication Adapter For Clustered Data Ontap
Subscribe
Vasa Provider For Clustered Data Ontap
Subscribe
Virtual Storage Console
Subscribe
|
|
Openbsd
Subscribe
|
Openssh
Subscribe
|
|
Oracle
Subscribe
|
Sun Zfs Storage Appliance Kit
Subscribe
|
|
Redhat
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1500-1 | openssh security update |
EUVD |
EUVD-2017-7325 | The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files. |
Ubuntu USN |
USN-3538-1 | OpenSSH vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:04:50.496Z
Reserved: 2017-10-25T00:00:00
Link: CVE-2017-15906
No data.
Status : Deferred
Published: 2017-10-26T03:29:00.220
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-15906
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN