Full Disclosure mailing list archives
[ GLSA 200802-06 ] scponly: Multiple vulnerabilities
From: Pierre-Yves Rofes <py () gentoo org>
Date: Tue, 12 Feb 2008 22:05:08 +0100
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200802-06 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: scponly: Multiple vulnerabilities Date: February 12, 2008 Bugs: #201726, #203099 ID: 200802-06 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities in scponly allow authenticated users to bypass security restrictions. Background ========== scponly is a shell for restricting user access to file transfer only using sftp and scp. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/scponly < 4.8 >= 4.8 Description =========== Florian Weimer from Debian discovered that scponly does not filter the - -o and -F options to the scp executable (CVE-2007-6415). Joachim Breitner reported that Subversion and rsync support invokes subcommands in an insecure manner (CVE-2007-6350). Impact ====== A local attacker could exploit these vulnerabilities to elevate privileges and execute arbitrary commands on the vulnerable host. Workaround ========== There is no known workaround at this time. Resolution ========== All scponly users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/scponly-4.8" Due to the design of scponly's Subversion support, security restrictions can still be circumvented. Please read carefully the SECURITY file included in the package. References ========== [ 1 ] CVE-2007-6350 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6350 [ 2 ] CVE-2007-6415 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6415 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200802-06.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security () gentoo org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.7 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFHsgoEuhJ+ozIKI5gRAraJAKCHEJDPFQ6iRJczTHwi1OHSGXPZxwCfSGhW 0Ma4OZrxv6aqZoal4IfEfL8= =2NSA -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- [ GLSA 200802-06 ] scponly: Multiple vulnerabilities Pierre-Yves Rofes (Feb 12)