drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in rssh
Name: |
Zwei Probleme in rssh |
|
ID: |
DSA-2578-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian squeeze, Debian wheezy |
|
Datum: |
Mi, 28. November 2012, 09:31 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2251
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2252 |
|
Applikationen: |
rssh |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-2578-1 security@debian.org http://www.debian.org/security/ Yves-Alexis Perez November 28, 2012 http://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : rssh Vulnerability : insufficient filtering of rsync command line Problem type : remote Debian-specific: no CVE ID : CVE-2012-2251 CVE-2012-2252 Debian Bug :
James Clawson discovered that rssh, a restricted shell for OpenSSH to be used with scp/sftp, rdist and cvs, was not correctly filtering command line options. This could be used to force the execution of a remote script and thus allow arbitrary command execution. Two CVE were assigned:
CVE-2012-2251 Incorrect filtering of command line when using rsync protocol. It was for example possible to pass dangerous options after a "--" switch. The rsync protocol support has been added in a Debian (and Fedora/Red Hat) specific patch, so this vulnerability doesn't affect upstream.
CVE-2012-2251 Incorrect filtering of the "--rsh" option: the filter preventing usage of the "--rsh=" option would not prevent passing "--rsh". This vulnerability affects upstream code.
For the stable distribution (squeeze), this problem has been fixed in version 2.3.2-13squeeze2.
For the testing distribution (wheezy), this problem has been fixed in version 2.3.3-6.
For the unstable distribution (sid), this problem has been fixed in version 2.3.3-6.
We recommend that you upgrade your rssh packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (GNU/Linux)
iQEcBAEBCgAGBQJQtUm5AAoJEG3bU/KmdcCl+mYH/i+Qu3RJaGkNZhz0JphBAMvT L2g1dbzNQOAePwvo69XIhNuAVAAqltV2N/GRvdlBORR7/W1NO9QOBodPwTkf4N9e enl9z9+Wxb9Z1NgRCkAjTd6rkdzxFPpAzTe4uF4WfUH306lbTDHZyR3KZgEFqOdS /16vbWoQ2QYz/hjIdlQI4GArBL+AZ5Fucq5oFqb5VcXv63Yi0U9qTliYH4iO/rzf CkDbm7cdD7bO7LbshEqC+Cz1khVDfIG/KakzByxoNgcvMCoyhE5v8QNp6qnCPf3U 2yZ+8X5rm3on0j6YUF7+qeBTcLSAinHY+6Qzq9r+T7/xa77N+NGWUmW18EkYup8= =Rfew -----END PGP SIGNATURE-----
-- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: http://lists.debian.org/20121127231613.6BAD51116@scapa.corsac.net
|
|
|
|