The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
{
"binaries": [
{
"binary_name": "openssh-client",
"binary_version": "1:6.6p1-2ubuntu2.10"
},
{
"binary_name": "openssh-server",
"binary_version": "1:6.6p1-2ubuntu2.10"
},
{
"binary_name": "openssh-sftp-server",
"binary_version": "1:6.6p1-2ubuntu2.10"
},
{
"binary_name": "ssh",
"binary_version": "1:6.6p1-2ubuntu2.10"
},
{
"binary_name": "ssh-askpass-gnome",
"binary_version": "1:6.6p1-2ubuntu2.10"
},
{
"binary_name": "ssh-krb5",
"binary_version": "1:6.6p1-2ubuntu2.10"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "openssh-client",
"binary_version": "1:7.2p2-4ubuntu2.4"
},
{
"binary_name": "openssh-client-ssh1",
"binary_version": "1:7.2p2-4ubuntu2.4"
},
{
"binary_name": "openssh-server",
"binary_version": "1:7.2p2-4ubuntu2.4"
},
{
"binary_name": "openssh-sftp-server",
"binary_version": "1:7.2p2-4ubuntu2.4"
},
{
"binary_name": "ssh",
"binary_version": "1:7.2p2-4ubuntu2.4"
},
{
"binary_name": "ssh-askpass-gnome",
"binary_version": "1:7.2p2-4ubuntu2.4"
},
{
"binary_name": "ssh-krb5",
"binary_version": "1:7.2p2-4ubuntu2.4"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "openssh-client",
"binary_version": "1:7.6p1-4"
},
{
"binary_name": "openssh-server",
"binary_version": "1:7.6p1-4"
},
{
"binary_name": "openssh-sftp-server",
"binary_version": "1:7.6p1-4"
},
{
"binary_name": "ssh",
"binary_version": "1:7.6p1-4"
},
{
"binary_name": "ssh-askpass-gnome",
"binary_version": "1:7.6p1-4"
}
],
"availability": "No subscription required"
}