<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OpenSSH Command Injection Vulnerability in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/openssh-command-injection-vulnerability/m-p/7203210#M948720</link>
    <description>&lt;P dir="auto" style="margin: 0;"&gt;Hello DjRg,&lt;/P&gt;
&lt;P dir="auto" style="margin: 0;"&gt;As per the infromation shared, you need to udate OpenSSH 8.3 (&lt;A href="https://www.openssh.com/" target="_blank"&gt;https://www.openssh.com/&lt;/A&gt;) or later to remediate these vulnerabilities.&lt;/P&gt;
&lt;P dir="auto" style="margin: 0;"&gt;I work for HPE/ I am an HPE Employee (HPE Community)&lt;/P&gt;</description>
    <pubDate>Wed, 20 Dec 2023 11:26:16 GMT</pubDate>
    <dc:creator>georgek_1</dc:creator>
    <dc:date>2023-12-20T11:26:16Z</dc:date>
    <item>
      <title>OpenSSH Command Injection Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/openssh-command-injection-vulnerability/m-p/7202255#M948709</link>
      <description>&lt;DIV&gt;&lt;P&gt;I had a review and I got the following problem&lt;/P&gt;&lt;P&gt;Has anyone had this problem and if so, how did they solve it?&lt;/P&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;"OpenSSH (OpenBSD Secure Shell) is a set of computer programs providing encrypted communication sessions over a computer network using the SSH protocol.&lt;/DIV&gt;&lt;DIV&gt;OpenSSH contains the following vulnerabilities:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Affected Versions:&lt;/DIV&gt;&lt;DIV&gt;OpenSSH versions prior to 8.3&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;Customers are advised to upgrade to OpenSSH 8.3 (&lt;A href="https://www.openssh.com/" target="_blank" rel="noopener"&gt;https://www.openssh.com/&lt;/A&gt;) or later to remediate these vulnerabilities.&lt;/DIV&gt;&lt;DIV&gt;Patch:&lt;/DIV&gt;&lt;DIV&gt;Following are links for downloading patches to fix the vulnerabilities:&lt;/DIV&gt;&lt;DIV&gt;OpenSSH 8.3 (&lt;A href="https://www.openssh.com/" target="_blank" rel="noopener"&gt;https://www.openssh.com/&lt;/A&gt;)&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;QID Detection Logic:&lt;/DIV&gt;&lt;DIV&gt;This unauthenticated detection works by reviewing the version of the OpenSSH service.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Vulnerable SSH-2.0-OpenSSH_8.0 PKIX[Portable] detected on port 22 over TCP."&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Tue, 05 Dec 2023 19:24:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/openssh-command-injection-vulnerability/m-p/7202255#M948709</guid>
      <dc:creator>DjRg</dc:creator>
      <dc:date>2023-12-05T19:24:23Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH Command Injection Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/openssh-command-injection-vulnerability/m-p/7203210#M948720</link>
      <description>&lt;P dir="auto" style="margin: 0;"&gt;Hello DjRg,&lt;/P&gt;
&lt;P dir="auto" style="margin: 0;"&gt;As per the infromation shared, you need to udate OpenSSH 8.3 (&lt;A href="https://www.openssh.com/" target="_blank"&gt;https://www.openssh.com/&lt;/A&gt;) or later to remediate these vulnerabilities.&lt;/P&gt;
&lt;P dir="auto" style="margin: 0;"&gt;I work for HPE/ I am an HPE Employee (HPE Community)&lt;/P&gt;</description>
      <pubDate>Wed, 20 Dec 2023 11:26:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/openssh-command-injection-vulnerability/m-p/7203210#M948720</guid>
      <dc:creator>georgek_1</dc:creator>
      <dc:date>2023-12-20T11:26:16Z</dc:date>
    </item>
  </channel>
</rss>

