Total vulnerabilities in the database
The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
Software | From | Fixed in |
---|---|---|
openbsd / openssh | - | 7.6 |
oracle / sun_zfs_storage_appliance_kit | 8.8.6 | 8.8.6.x |
debian / debian_linux | 8.0 | 8.0.x |
netapp / virtual_storage_console | 9.7 | 9.7.x |
netapp / storage_replication_adapter_for_clustered_data_ontap | 9.7 | 9.7.x |
netapp / storage_replication_adapter_for_clustered_data_ontap | 9.6 | 9.6.x |
netapp / vasa_provider_for_clustered_data_ontap | 9.7 | 9.7.x |
netapp / vasa_provider_for_clustered_data_ontap | 6.0 | 6.2.x |
netapp / virtual_storage_console | 9.6 | 9.6.x |
redhat / enterprise_linux_desktop | 7.0 | 7.0.x |
redhat / enterprise_linux_workstation | 7.0 | 7.0.x |
redhat / enterprise_linux_server | 7.0 | 7.0.x |
redhat / enterprise_linux_server_tus | 7.6 | 7.6.x |
redhat / enterprise_linux_server_aus | 7.6 | 7.6.x |
redhat / enterprise_linux_eus | 7.6 | 7.6.x |
redhat / enterprise_linux_server_aus | 7.7 | 7.7.x |
redhat / enterprise_linux_server_tus | 7.7 | 7.7.x |
redhat / enterprise_linux_eus | 7.7 | 7.7.x |