CVE-2007-6415 - scponly allows remote command execution
Bug #249593 reported by
Michael Casadevall
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
scponly (Ubuntu) |
Invalid
|
Undecided
|
Michael Casadevall | ||
Dapper |
Fix Released
|
Undecided
|
Unassigned | ||
Feisty |
Won't Fix
|
Undecided
|
Michael Casadevall | ||
Gutsy |
Won't Fix
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: scponly
scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute arbitrary code by invoking scp, as implemented by OpenSSH, with the -F and -o options.
Fixed in hardy, and intrepid.
Fixes coming for gutsy, fiesty, and dapper
Changed in scponly: | |
assignee: | nobody → sonicmctails |
status: | New → In Progress |
Changed in scponly: | |
status: | In Progress → Invalid |
assignee: | nobody → sonicmctails |
status: | New → In Progress |
assignee: | nobody → sonicmctails |
status: | New → In Progress |
Changed in scponly (Ubuntu Dapper): | |
status: | Triaged → Fix Committed |
assignee: | Michael Casadevall (mcasadevall) → nobody |
To post a comment you must log in.
scponly was fixed by Debian upstream before gutsy release; relevant changelog:
scponly (4.6-1.1) unstable; urgency=high
* Non-maintainer upload by the testing-security team
* Disable unison, rsync and svn usability, because all three could be
exploited. (Closes: #437148)
- The maintainer is working on splitting the packages and providing
a binary package, which enables these features, but warns about
them and one, which is safe and has them disabled, like this
-- Steffen Joeris <email address hidden> Tue, 25 Sep 2007 10:06:31 +0000