The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client's download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that "this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol" and "utimes does not fail under normal circumstances.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T11:48:57.926Z

Reserved: 2020-04-22T00:00:00

Link: CVE-2020-12062

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-01T16:15:14.260

Modified: 2024-11-21T04:59:12.097

Link: CVE-2020-12062

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-05-27T00:00:00Z

Links: CVE-2020-12062 - Bugzilla

cve-icon OpenCVE Enrichment

No data.