[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1473 scponly -- design flaw

ID: oval:org.mitre.oval:def:7732Date: (C)2009-12-15   (M)2021-06-02
Class: PATCHFamily: unix




Joachim Breitner discovered that Subversion support in scponly is inherently insecure, allowing execution of arbitrary commands. Further investigation showed that rsync and Unison support suffer from similar issues. This set of issues has been assigned CVE-2007-6350. In addition, it was discovered that it was possible to invoke scp with certain options that may lead to the execution of arbitrary commands (CVE-2007-6415). This update removes Subversion, rsync and Unison support from the scponly package, and prevents scp from being invoked with the dangerous options.

Platform:
Debian 4.0
Debian 3.1
Product:
scponly
Reference:
DSA-1473
CVE-2007-6350
CVE-2007-6415
CVE    2
CVE-2007-6350
CVE-2007-6415
CPE    2
cpe:/o:debian:debian_linux:3.1
cpe:/o:debian:debian_linux:4.0

© SecPod Technologies