int(3725)

Vulnerability Bulletins


Ejecución de comandos arbitrarios en Scponly

Vulnerability classification

Property Value
Confidence level Oficial
Impact Aumento de privilegios
Dificulty Experto
Required attacker level Acceso remoto con cuenta

System information

Property Value
Affected manufacturer GNU/Linux
Affected software Scponly <= 4.6

Description

Se han descubierto múltiples vulnerabilidades en el "shell" scponly 4.6 y anteriores. Las vulnerabilidades son descritas a continuación:

- CVE-2007-6350: La vulnerabilidad reside en un error de diseño al invocar a subcomandos como Subversion, unison, rsync, svnserve, y svn. Un atacante remoto autenticado en scponly podría saltarse algunas restricciones de seguridad y ejecutar comandos arbitrarios.

- CVE-2007-6415: La vulnerabilidad reside en un error de diseño. Un atacante local podría ejecutar comandos arbitrarios mediante la invocación de scp con ciertas opciones.

Solution



Actualización de software

Debian (DSA 1473-1)

Debian Linux 3.1
Source
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0.orig.tar.gz
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2.diff.gz
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2.dsc
alpha (DEC Alpha)
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_alpha.deb
amd64 (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_amd64.deb
arm (ARM)
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_arm.deb
hppa (HP PA RISC)
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_hppa.deb
i386 (Intel ia32)
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_i386.deb
ia64 (Intel ia64)
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_ia64.deb
m68k (Motorola Mc680x0)
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_m68k.deb
mips (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_mips.deb
mipsel (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_mipsel.deb
powerpc (PowerPC)
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_powerpc.deb
s390 (IBM S/390)
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_s390.deb
sparc (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_sparc.deb

Debian Linux 4.0
Source
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1.diff.gz
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1.dsc
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6.orig.tar.gz
alpha (DEC Alpha)
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_alpha.deb
amd64 (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_amd64.deb
arm (ARM)
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_arm.deb
hppa (HP PA RISC)
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_hppa.deb
i386 (Intel ia32)
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_i386.deb
ia64 (Intel ia64)
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_ia64.deb
mips (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_mips.deb
mipsel (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_mipsel.deb
powerpc (PowerPC)
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_powerpc.deb
s390 (IBM S/390)
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_s390.deb
sparc (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch1_sparc.deb

Standar resources

Property Value
CVE CVE-2007-6350
CVE-2007-6415
BID 26900

Other resources

Debian Security Advisory (DSA 1473-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00034.html

Version history

Version Comments Date
1.0 Aviso emitido 2008-01-24
2.0 Actualizado el impacto 2008-01-25
Ministerio de Defensa
CNI
CCN
CCN-CERT