Summary: | OpenSSH scp Command Line Shell Command Injection | ||
---|---|---|---|
Product: | Sisyphus | Reporter: | Igor Zubkov <icesik> |
Component: | openssh | Assignee: | Gleb F-Malinovskiy <glebfm> |
Status: | CLOSED FIXED | QA Contact: | qa-sisyphus |
Severity: | critical | ||
Priority: | P2 | CC: | glebfm, ldv, mike, solo, vt, vvk |
Version: | unstable | ||
Hardware: | all | ||
OS: | Linux | ||
URL: | http://secunia.com/advisories/18579/ |
Description
Igor Zubkov
2006-01-24 16:32:58 MSK
scp как наследник rcp морально устарел, рекомендую переходить на sftp или rsync. Вот ответ, который дал Markus Friedl: "it's inherited from rcp, it's more or less the 'way it works'. if there is a simple way to fix it without breaking scp completely, then we can include it in a future release, but so far i consider this a minor problem." Может тогда вынести scp в отдельный пакет с замечание "ни в кое случае не ставить"? *** Bug 10001 has been marked as a duplicate of this bug. *** Раз кто-то не поленился сделать патч (https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168167), я его посмотрю и приложу. * Tue Oct 03 2006 Dmitry V. Levin <ldv@altlinux.org> 3.6.1p2-alt8 - Backported upstream fixes for: + sshd connection consumption vulnerability (CVE-2004-2069: low, remote, active), + scp local arbitrary command execution vulnerability (CVE-2006-0225: high, local, active), ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + sshd signal handler race condition (CVE-2006-5051: none, remote, active), + CRC compensation attack detector DoS (CVE-2006-4924: low, remote, active), + client NULL dereference on protocol error (CVE-2006-4925: low, remote, passive). - Applied RH patch to plug several sftp memleaks. Извиняюсь, забыл закрыть. |