Lucene search

K

[SECURITY] [DSA 1473-1] New scponly packages fix arbitrary code execution

🗓️ 21 Jan 2008 19:26:33Reported by DebianType 
debian
 debian
🔗 lists.debian.org👁 23 Views

Remote code execution vulnerability in scponly package fixed by removing support for Subversion, rsync, Unison, and preventing dangerous scp options. Upgrade to version 4.6-1etch1 for etch or 4.0-1sarge2 for sarge.

Show more
Related
Packages
OSOS VersionArchitecturePackagePackage VersionFilename
Debian3.1powerpcscponly4.0-1sarge2scponly_4.0-1sarge2_powerpc.deb
Debian3.1sparcscponly4.0-1sarge2scponly_4.0-1sarge2_sparc.deb
Debian4armscponly4.6-1etch1scponly_4.6-1etch1_arm.deb
Debian3.1ia64scponly4.0-1sarge2scponly_4.0-1sarge2_ia64.deb
Debian4alphascponly4.6-1etch1scponly_4.6-1etch1_alpha.deb
Debian4ia64scponly4.6-1etch1scponly_4.6-1etch1_ia64.deb
Debian3.1i386scponly4.0-1sarge2scponly_4.0-1sarge2_i386.deb
Debian3.1allscponly4.0-1sarge2scponly_4.0-1sarge2_all.deb
Debian4mipselscponly4.6-1etch1scponly_4.6-1etch1_mipsel.deb
Debian4allscponly4.6-1etch1scponly_4.6-1etch1_all.deb
Rows per page

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
21 Jan 2008 19:33Current
6.8Medium risk
Vulners AI Score6.8
CVSS28.5
EPSS0.033
23
.json
Report