Lucene search

K
osvGoogleOSV:DSA-1473-1
HistoryJan 21, 2008 - 12:00 a.m.

scponly - arbitrary code execution

2008-01-2100:00:00
Google
osv.dev
3

0.021 Low

EPSS

Percentile

89.2%

Joachim Breitner discovered that Subversion support in scponly is
inherently insecure, allowing execution of arbitrary commands. Further
investigation showed that rsync and Unison support suffer from similar
issues. This set of issues has been assigned CVE-2007-6350.

In addition, it was discovered that it was possible to invoke scp
with certain options that may lead to the execution of arbitrary commands
(CVE-2007-6415).

This update removes Subversion, rsync and Unison support from the
scponly package, and prevents scp from being invoked with the dangerous
options.

For the old stable distribution (sarge), these problems have been fixed
in version 4.0-1sarge2.

For the stable distribution (etch), these problems have been fixed in
version 4.6-1etch1.

The unstable distribution (sid) will be fixed soon.

We recommend that you upgrade your scponly package.

CPENameOperatorVersion
scponlyeq4.6-1