The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
[
{
"id": "CVE-2017-15906-09c3b956",
"signature_version": "v1",
"digest": {
"function_hash": "245508202350905329393278082937121320963",
"length": 1097.0
},
"deprecated": false,
"source": "https://github.com/openbsd/src/commit/a6981567e8e215acc1ef690c8dbb30f2d9b00a19",
"signature_type": "Function",
"target": {
"file": "usr.bin/ssh/sftp-server.c",
"function": "process_open"
}
},
{
"id": "CVE-2017-15906-37a449e1",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"73451354983332106238004573019954184765",
"115047829827750025844972100937310889789",
"225154063895468876819726826952558484895",
"228425264224619864482417641601121868070",
"128057601860705487882805129516859362391",
"140618039411384439181225380759627597025"
]
},
"deprecated": false,
"source": "https://github.com/openbsd/src/commit/a6981567e8e215acc1ef690c8dbb30f2d9b00a19",
"signature_type": "Line",
"target": {
"file": "usr.bin/ssh/sftp-server.c"
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-15906.json"