Severity
5.3MEDIUM
EPSS
3.2%
top 13.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 26
Latest updateMay 13

Description

The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages9 packages

NVDopenbsd/openssh< 7.6
Debianopenssh< 1:7.6p1-1+3
NVDnetapp/vasa_provider6.06.2+1

Also affects: Debian Linux 8.0, Enterprise Linux 7.6, 7.7

🔴Vulnerability Details

3
GHSA
GHSA-543w-q592-87ph: The process_open function in sftp-server2022-05-13
CVEList
CVE-2017-15906: The process_open function in sftp-server2017-10-26
OSV
CVE-2017-15906: The process_open function in sftp-server2017-10-26

📋Vendor Advisories

3
Ubuntu
OpenSSH vulnerabilities2018-01-22
Red Hat
openssh: Improper write operations in readonly mode allow for zero-length file creation2017-10-03
Debian
CVE-2017-15906: openssh - The process_open function in sftp-server.c in OpenSSH before 7.6 does not proper...2017

💬Community

2
Bugzilla
CVE-2017-15906 openssh: Improper write operations in readonly mode allow for zero-length file creation [fedora-all]2017-10-26
Bugzilla
CVE-2017-15906 openssh: Improper write operations in readonly mode allow for zero-length file creation2017-10-26
CVE-2017-15906 (MEDIUM CVSS 5.3) | The process_open function in sftp-s | cvebase.io