Jump to content

Oh SCPt! - 36 year old flaws affecting SCP (OpenSSH, Putty, WinSCP) discovered

rcmaehl

Source:
ZDNet

 

Summary:
36 year old flaws in SCP (ran on top of SSH), allow servers to make unauthorized and hidden changes to users

 

Media:

Image result for scp vulnerabilities
 

Quotes/Excerpts:

Quote

All SCP (Secure Copy Protocol) implementations...since 1983, are vulnerable to four security bugs that allow a malicious SCP server to make unauthorized changes to a client's (user's) system and hide malicious operations in the terminal. The vulnerabilities have been discovered by Harry Sintonen. For our readers that are not familiar with SCP, the protocol is a "secure" implementation of the RCP (Remote Copy Protocol) --a protocol for transferring files across a network. SCP works on top of the SSH protocol and supports an authentication mechanism to provide authenticity and confidentiality for transferred files, just like SSH provides the same thing for the older and insecure Telnet protocol. SCP is the standard file transfer method for OpenSSH, Putty, and WinSCP. Sintonen revealed the existence of four major security bugs affecting SCP implementations: CVE-2018-20685, CVE-2019-6111, CVE-2019-6109, CVE-2019-6110. The issues have their roots in the original BSD implementation of the RCP protocol... all SCP implementations in the past 36 years are affected. At the time of writing, only the WinSCP team has addressed the reported issues. If patching is not an option... users are advised to configure SCP clients to request files via SFTP (Secure FTP). It should be noted that any attacks that may try to exploit these vulnerabilities rely on a malicious party taking over an SCP server, or being in a Man-in-the-Middle position.


My Thoughts:

Big OOF. 36 years is quite a long time for an exploit like this to go undiscovered. While I don't use OpenSSH personally for file transfer, I do know several people that use it as such and would be affected by this, especially in the server admin community. Definitely something that needs to be kept an eye on until the software you used is patched.

Edited by rcmaehl
Forgot to link text of source.

PLEASE QUOTE ME IF YOU ARE REPLYING TO ME

Desktop Build: Ryzen 7 2700X @ 4.0GHz, AsRock Fatal1ty X370 Professional Gaming, 48GB Corsair DDR4 @ 3000MHz, RX5700 XT 8GB Sapphire Nitro+, Benq XL2730 1440p 144Hz FS

Retro Build: Intel Pentium III @ 500 MHz, Dell Optiplex G1 Full AT Tower, 768MB SDRAM @ 133MHz, Integrated Graphics, Generic 1024x768 60Hz Monitor


 

Link to comment
Share on other sites

Link to post
Share on other sites

wait isn't openSSH bundeled with most Linux distro's? or am i wrong there?

She/Her

Link to comment
Share on other sites

Link to post
Share on other sites

OpenSSH is an implementation of SSH, and is used everyday by millions of people.

 

I use SCP rarely: it has no optimisation on utilisation of connections, and is generally vastly inferior to uploading your data to a storage server (eg AWS S3) and downloading it at the other end, all using HTTPS

Link to comment
Share on other sites

Link to post
Share on other sites

10 minutes ago, rcmaehl said:

36 year old flaws in SCP

SCP: Secure Contain Protect

CPU: Intel Core i7-950 Motherboard: Gigabyte GA-X58A-UD3R CPU Cooler: NZXT HAVIK 140 RAM: Corsair Dominator DDR3-1600 (1x2GB), Crucial DDR3-1600 (2x4GB), Crucial Ballistix Sport DDR3-1600 (1x4GB) GPU: ASUS GeForce GTX 770 DirectCU II 2GB SSD: Samsung 860 EVO 2.5" 1TB HDDs: WD Green 3.5" 1TB, WD Blue 3.5" 1TB PSU: Corsair AX860i & CableMod ModFlex Cables Case: Fractal Design Meshify C TG (White) Fans: 2x Dynamic X2 GP-12 Monitors: LG 24GL600F, Samsung S24D390 Keyboard: Logitech G710+ Mouse: Logitech G502 Proteus Spectrum Mouse Pad: Steelseries QcK Audio: Bose SoundSport In-Ear Headphones

Link to comment
Share on other sites

Link to post
Share on other sites

6 minutes ago, firelighter487 said:

wait isn't openSSH bundeled with most Linux distro's? or am i wrong there?

Yes, it is.

Hand, n. A singular instrument worn at the end of the human arm and commonly thrust into somebody’s pocket.

Link to comment
Share on other sites

Link to post
Share on other sites

Only the first bug number returns anything related to SCP. The other 3 don't return anything. Am I missing something?

 

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685

Quote

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename.

And this one looks to be fixed:

https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2

 

So I'm a bit confused.

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, WereCatf said:

Yes, it is.

....so most Linux installs are vunerable to this? 

She/Her

Link to comment
Share on other sites

Link to post
Share on other sites

I always use SFTP :D

Computer users fall into two groups:
those that do backups
those that have never had a hard drive fail.

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, firelighter487 said:

....so most Linux installs are vunerable to this? 

No, most linux installs are done by specialists in the networking and system administration and OP has wrote when can someone use this vulnerabilities to attack.

Also this is not microsoft. These vulnerabilities will be patched in 2 days at max.

Computer users fall into two groups:
those that do backups
those that have never had a hard drive fail.

Link to comment
Share on other sites

Link to post
Share on other sites

I use scp quite a lot, myself. I spend quite a lot of time in the command-line, and it's just so quick and easy to hammer out

scp thisfile user@server:/whereIwantthefile/

 

Hand, n. A singular instrument worn at the end of the human arm and commonly thrust into somebody’s pocket.

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, mate_mate91 said:

Also this is not microsoft. These vulnerabilities will be patched in 2 days at max.

that kinda scares me because AFAIK ssh is bundeled in with Windows 10 as well... 

She/Her

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, firelighter487 said:

that kinda scares me because AFAIK ssh is bundeled in with Windows 10 as well... 

This is NOT ssh vulnerabilitis, it's SCPs.

Computer users fall into two groups:
those that do backups
those that have never had a hard drive fail.

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, mate_mate91 said:

No, most linux installs are done by specialists in the networking and system administration

That's a stupid argument. The installations being done by "specialists" is only helpful, if the specialists are aware of the vulnerabilities, but since these vulnerabilities are apparently newly-discovered, those "specialists" can't be aware of them and therefore haven't done any mitigations.

Hand, n. A singular instrument worn at the end of the human arm and commonly thrust into somebody’s pocket.

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, WereCatf said:

That's a stupid argument. The installations being done by "specialists" is only helpful, if the specialists are aware of the vulnerabilities, but since these vulnerabilities are apparently newly-discovered, those "specialists" can't be aware of them and therefore haven't done any mitigations.

I used those arguments against these " taking over an SCP server, or being in a Man-in-the-Middle position." Because OP wrote that to use those vulnerabilities you must do one of those two things :)

Computer users fall into two groups:
those that do backups
those that have never had a hard drive fail.

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, mate_mate91 said:

This is NOT ssh vulnerabilitis, it's SCPs.

the OP has openSSH mentioned in it... can you explain what exactly is the issue? 

She/Her

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, firelighter487 said:

the OP has openSSH mentioned in it... can you explain what exactly is the issue? 

OpenSSH is a specific implementation of the SSH-protocol. It doesn't mean that all SSH-libraries are vulnerable, just that OpenSSH is. There are plenty of other SSH-implementations out there and AFAIK Windows doesn't use OpenSSH.

Hand, n. A singular instrument worn at the end of the human arm and commonly thrust into somebody’s pocket.

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, mate_mate91 said:

I used those arguments against these " taking over an SCP server, or being in a Man-in-the-Middle position." Because OP wrote that to use those vulnerabilities you must do one of those two things :)

And? I assume you have no idea how widely SSH is by all the various sysadmins to do remote tasks, and if the admins themselves aren't the owners of the remote-servers they're connecting to, they may not know the server has been compromised.

Hand, n. A singular instrument worn at the end of the human arm and commonly thrust into somebody’s pocket.

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, firelighter487 said:

the OP has openSSH mentioned in it... can you explain what exactly is the issue? 

Do not worry. WereCatf already answered you. Also if anyone is worried just configure your scp to request files with sftp. That's it. If you really want scp just wait for patches.

Computer users fall into two groups:
those that do backups
those that have never had a hard drive fail.

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, WereCatf said:

And? I assume you have no idea how widely SSH is by all the various sysadmins to do remote tasks, and if the admins themselves aren't the owners of the remote-servers they're connecting to, they may not know the server has been compromised.

SSH is not a problem. You can use ssh (Well if someone did not discover vulnerabilities in it's implementation minutes ago :D) as long as you configure scp to request files via sftp you are secured!

Computer users fall into two groups:
those that do backups
those that have never had a hard drive fail.

Link to comment
Share on other sites

Link to post
Share on other sites

if its not a bug inside ssh/openssh itself then we good

Link to comment
Share on other sites

Link to post
Share on other sites

That's an impressively severe bug to have lasted for 36 years across multiple implementations without anyone noticing. It does only affect you if you use SCP to copy a file to a malicious (or compromised) server, so unless you consciously use SCP (which is, at least for me, a tool that is quite useful but only occasionally) it probably won't affect you.

HTTP/2 203

Link to comment
Share on other sites

Link to post
Share on other sites

Interesting read, I always enjoy @rcmaehl posts on cyber-security issues so keep it up!

Link to comment
Share on other sites

Link to post
Share on other sites

thanks to the OP, I was the first one to hear about this at work.

 

So thank you, and keep it up :) @rcmaehl

"If a Lobster is a fish because it moves by jumping, then a kangaroo is a bird" - Admiral Paulo de Castro Moreira da Silva

"There is nothing more difficult than fixing something that isn't all the way broken yet." - Author Unknown

Spoiler

Intel Core i7-3960X @ 4.6 GHz - Asus P9X79WS/IPMI - 12GB DDR3-1600 quad-channel - EVGA GTX 1080ti SC - Fractal Design Define R5 - 500GB Crucial MX200 - NH-D15 - Logitech G710+ - Mionix Naos 7000 - Sennheiser PC350 w/Topping VX-1

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, rcmaehl said:

Oh SCPt!

Masterful title work! xD 

 

[related to post]

There's something I'd like to point out, though.  Humans aren't perfect, so we can never make anything that IS perfect.  Having said that, for this SCP thing to have an exploit discovered after 36 YEARS, I'd say it's pretty damn secure.  That's a lot of years before somebody breached it.  I'm impressed!

Sorry for the mess!  My laptop just went ROG!

"THE ROGUE":  ASUS ROG Zephyrus G15 GA503QR (2021)

  • Ryzen 9 5900HS
  • RTX 3070 Laptop GPU (80W)
  • 24GB DDR4-3200 (8+16)
  • 2TB SK Hynix NVMe (boot) + 2TB Crucial P2 NVMe (games)
  • 90Wh battery + 200W power brick
  • 15.6" 1440p 165Hz IPS Pantone display
  • Logitech G603 mouse + Logitech G733 headset

"Hex": Dell G7 7588 (2018)

  • i7-8750H
  • GTX 1060 Max-Q
  • 16GB DDR4-2666
  • 1TB SK Hynix NVMe (boot) + 2TB Crucial MX500 SATA (games)
  • 56Wh battery + 180W power brick
  • 15.6" 1080p 60Hz IPS display
  • Corsair Harpoon Wireless mouse + Corsair HS70 headset

"Mishiimin": Apple iMac 5K 27" (2017)

  • i7-7700K
  • Radeon Pro 580 8GB (basically a desktop R9 390)
  • 16GB DDR4-2400
  • 2TB SSHD
  • 400W power supply (I think?)
  • 27" 5K 75Hz Retina display
  • Logitech G213 keyboard + Logitech G203 Prodigy mouse

Other tech: Apple iPhone 14 Pro Max 256GB in White, Sennheiser PXC 550-II, Razer Hammerhead earbuds, JBL Tune Flex earbuds, OontZ Angle 3 Ultra, Raspberry Pi 400, Logitech M510 mouse, Redragon S113 keyboard & mouse, Cherry MX Silent Red keyboard, Cooler Master Devastator II keyboard (not in use), Sennheiser HD4.40BT (not in use)

Retired tech: Apple iPhone XR 256GB in Product(RED), Apple iPhone SE 64GB in Space Grey (2016), iPod Nano 7th Gen in Product(RED), Logitech G533 headset, Logitech G930 headset, Apple AirPods Gen 2 and Gen 3

Trash bin (do not buy): Logitech G935 headset, Logitech G933 headset, Cooler Master Devastator II mouse, Razer Atheris mouse, Chinese off-brand earbuds, anything made by Skullcandy

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, Techstorm970 said:

Having said that, for this SCP thing to have an exploit discovered after 36 YEARS, I'd say it's pretty damn secure.  That's a lot of years before somebody breached it.  I'm impressed!

Chief, seldom do these exploits get discovered by white hats or developers before black and grey hats.

Come Bloody Angel

Break off your chains

And look what I've found in the dirt.

 

Pale battered body

Seems she was struggling

Something is wrong with this world.

 

Fierce Bloody Angel

The blood is on your hands

Why did you come to this world?

 

Everybody turns to dust.

 

Everybody turns to dust.

 

The blood is on your hands.

 

The blood is on your hands!

 

Pyo.

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×