Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <1354058463.7676.13.camel@scapa>
Date: Wed, 28 Nov 2012 00:21:03 +0100
From: Yves-Alexis Perez <corsac@...ian.org>
To: oss-security@...ts.openwall.com
Cc: secure-testing-team@...ts.alioth.debian.org, Russ Allbery
 <rra@...ian.org>,  code@...zashack.org, temp66@...il.com
Subject: rssh: incorrect filtering of command line options

Hi people,

I've just released DSA 2578-1 which affects rssh after coordination on
the distro list and I'm now posting to oss-sec per policy.

Package        : rssh
Vulnerability  : incorrect filtering of command line options
Problem type   : remote
CVE ID         : CVE-2012-2251 CVE-2012-2252 

James Clawson discovered that rssh, a restricted shell for OpenSSH to be used
with scp/sftp, rdist and cvs, was not correctly filtering command line options.
This could be used to force the execution of a remote script and thus allow
arbitrary command execution. Two CVE were assigned:

CVE-2012-2251
	Incorrect filtering of command line when using rsync protocol. It was
	for example possible to pass dangerous options after a "--" switch. The rsync
	protocol support has been added in a Debian (and Fedora/Red Hat) specific
	patch, so this vulnerability doesn't affect upstream.

CVE-2012-2251
	Incorrect filtering of the "--rsh" option: the filter preventing usage of the
	"--rsh=" option would not prevent passing "--rsh". This vulnerability affects
	upstream code.

Regards,
-- 
Yves-Alexis Perez
 Debian Security

Download attachment "signature.asc" of type "application/pgp-signature" (491 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.