Vulnerabilities > CVE-2000-0992

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
ssh
openbsd
nessus
exploit available

Summary

Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.

Exploit-Db

descriptionOpenSSH 1.2 scp File Create/Overwrite Vulnerability. CVE-2000-0992. Remote exploit for linux platform
idEDB-ID:20253
last seen2016-02-02
modified2000-09-30
published2000-09-30
reporterMichal Zalewski
sourcehttps://www.exploit-db.com/download/20253/
titleOpenSSH 1.2 scp File Create/Overwrite Vulnerability

Nessus

NASL familyGain a shell remotely
NASL idSSH_SCP.NASL
descriptionYou are running OpenSSH 1.2.3, or 1.2. This version has directory traversal vulnerability in scp, it allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.
last seen2020-06-01
modified2020-06-02
plugin id11339
published2003-03-10
reporterThis script is Copyright (C) 2003-2018 Xue Yong Zhi
sourcehttps://www.tenable.com/plugins/nessus/11339
titlesshd scp Traversal Arbitrary File Overwrite
code
#
# This script was written by Xue Yong Zhi<[email protected]>
#
# See the Nessus Scripts License for details
#

# Changes by Tenable:
# - Revised plugin title (8/7/09)
# - Updated to use compat.inc, added CVSS score (11/20/2009)


include("compat.inc");

if(description)
{
 script_id(11339);
 script_version ("1.14");
 script_cve_id("CVE-2000-0992");
 script_bugtraq_id(1742);
 
 script_name(english:"sshd scp Traversal Arbitrary File Overwrite");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote host has an application that is affected by a
directory traversal issue." );
 script_set_attribute(attribute:"description", value:
"You are running OpenSSH 1.2.3, or 1.2. 
 
This version has directory traversal vulnerability in scp,
it allows a remote malicious scp server to overwrite arbitrary 
files via a .. (dot dot) attack." );
 script_set_attribute(attribute:"solution", value:
"Patch and New version are available from SSH/OpenSSH." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
	
 script_set_attribute(attribute:"plugin_publication_date", value: "2003/03/10");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/09/30");
 script_cvs_date("Date: 2018/08/22 16:49:14");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
 script_summary(english:"Checks for the remote SSH version");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2003-2018 Xue Yong Zhi");
 script_family(english:"Gain a shell remotely");
 script_dependencie("ssh_detect.nasl");
 script_require_ports("Services/ssh", 22);
 exit(0);
}

#
# The script code starts here
#
include("backport.inc");

port = get_kb_item("Services/ssh");
if(!port)port = 22;

banner = get_kb_item("SSH/banner/" + port );
if ( ! banner ) exit(0);

banner = get_backport_banner(banner:banner);

#Looking for OpenSSH product version number 1.2 and 1.2.3	
if(ereg(pattern:".*openssh[-_](1\.2($|\.3|[^0-9])).*",string:banner, icase:TRUE))security_warning(port);

if(ereg(pattern:".*ssh-.*-1\.2\.(1[0-4]|2[0-7])[^0-9]", string:banner, icase:TRUE))security_warning(port);