Bug 8922

Summary: OpenSSH scp Command Line Shell Command Injection
Product: Sisyphus Reporter: Igor Zubkov <icesik>
Component: opensshAssignee: Gleb F-Malinovskiy <glebfm>
Status: CLOSED FIXED QA Contact: qa-sisyphus
Severity: critical    
Priority: P2 CC: glebfm, ldv, mike, solo, vt, vvk
Version: unstable   
Hardware: all   
OS: Linux   
URL: http://secunia.com/advisories/18579/

Comment 1 Dmitry V. Levin 2006-01-24 16:51:55 MSK
scp как наследник rcp морально устарел, рекомендую переходить на sftp или rsync.

Вот ответ, который дал Markus Friedl:
"it's inherited from rcp, it's more or less the 'way it works'. if there is a
simple way to fix it without breaking scp completely, then we can include it in
a future release, but so far i consider this a minor problem."
Comment 2 Igor Zubkov 2006-03-25 15:31:38 MSK
Может тогда вынести scp в отдельный пакет с замечание "ни в кое случае не ставить"?
Comment 3 Igor Zubkov 2006-09-14 15:06:00 MSD
*** Bug 10001 has been marked as a duplicate of this bug. ***
Comment 5 Dmitry V. Levin 2006-09-14 16:51:56 MSD
Раз кто-то не поленился сделать патч
(https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168167),
я его посмотрю и приложу.
Comment 6 Michael Shigorin 2006-11-24 13:05:43 MSK
* Tue Oct 03 2006 Dmitry V. Levin <ldv@altlinux.org> 3.6.1p2-alt8
- Backported upstream fixes for:
  + sshd connection consumption vulnerability
    (CVE-2004-2069: low, remote, active),
  + scp local arbitrary command execution vulnerability
    (CVE-2006-0225: high, local, active),
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  + sshd signal handler race condition
    (CVE-2006-5051: none, remote, active),
  + CRC compensation attack detector DoS
    (CVE-2006-4924: low, remote, active),
  + client NULL dereference on protocol error
    (CVE-2006-4925: low, remote, passive).
- Applied RH patch to plug several sftp memleaks.
Comment 7 Igor Zubkov 2006-11-24 15:16:52 MSK
Извиняюсь, забыл закрыть.