It was discovered that libssh incorrectly handled certain scp commands. If a user or automated system were tricked into using a specially-crafted scp command, a remote attacker could execute arbitrary commands on the server.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "0.6.3-4.3ubuntu0.5", "binary_name": "libssh-4" }, { "binary_version": "0.6.3-4.3ubuntu0.5", "binary_name": "libssh-4-dbgsym" }, { "binary_version": "0.6.3-4.3ubuntu0.5", "binary_name": "libssh-dbg" }, { "binary_version": "0.6.3-4.3ubuntu0.5", "binary_name": "libssh-dev" }, { "binary_version": "0.6.3-4.3ubuntu0.5", "binary_name": "libssh-dev-dbgsym" }, { "binary_version": "0.6.3-4.3ubuntu0.5", "binary_name": "libssh-doc" }, { "binary_version": "0.6.3-4.3ubuntu0.5", "binary_name": "libssh-gcrypt-4" }, { "binary_version": "0.6.3-4.3ubuntu0.5", "binary_name": "libssh-gcrypt-4-dbgsym" }, { "binary_version": "0.6.3-4.3ubuntu0.5", "binary_name": "libssh-gcrypt-dev" }, { "binary_version": "0.6.3-4.3ubuntu0.5", "binary_name": "libssh-gcrypt-dev-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "0.8.0~20170825.94fa1e38-1ubuntu0.5", "binary_name": "libssh-4" }, { "binary_version": "0.8.0~20170825.94fa1e38-1ubuntu0.5", "binary_name": "libssh-4-dbgsym" }, { "binary_version": "0.8.0~20170825.94fa1e38-1ubuntu0.5", "binary_name": "libssh-dev" }, { "binary_version": "0.8.0~20170825.94fa1e38-1ubuntu0.5", "binary_name": "libssh-doc" }, { "binary_version": "0.8.0~20170825.94fa1e38-1ubuntu0.5", "binary_name": "libssh-gcrypt-4" }, { "binary_version": "0.8.0~20170825.94fa1e38-1ubuntu0.5", "binary_name": "libssh-gcrypt-4-dbgsym" }, { "binary_version": "0.8.0~20170825.94fa1e38-1ubuntu0.5", "binary_name": "libssh-gcrypt-dev" } ] }