OpenSSH Client Vulnerability in Progress Meter Display
CVE-2019-6109
6.8MEDIUM
Summary
A vulnerability in OpenSSH 7.9 allows an adversary to exploit the progress display of file transfers. Through crafted object names, a malicious server or Man-in-the-Middle attacker can manipulate the output, potentially obscuring additional files being transferred. This flaw stems from insufficient character encoding within the refresh_progress_meter() function in progressmeter.c, posing risks during data transmission that may go unnoticed by the user.
References
CVSS V3.1
Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved