aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorHideyuki KURASHINA <rushani@FreeBSD.org>2004-12-03 08:22:49 +0000
committerHideyuki KURASHINA <rushani@FreeBSD.org>2004-12-03 08:22:49 +0000
commit0ec4007514f16922759ed65df24a1363be1bebe3 (patch)
tree9e4f587ef0d52a5142ef35280b0e02da555daaed /security
parent9da0d8c8139a383b045490d87c48ed6a87a777a3 (diff)
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml33
1 files changed, 33 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index c25eb5c6e496..1c46bc4a9b3c 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,39 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="f11b219a-44b6-11d9-ae2f-021106004fd6">
+ <topic>rssh &amp; scponly -- arbitrary command execution</topic>
+ <affects>
+ <package>
+ <name>rssh</name>
+ <range><le>2.2.2</le></range>
+ </package>
+ <package>
+ <name>scponly</name>
+ <range><lt>4.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jason Wies identified both rssh &amp; scponly have a vulnerability
+ that allows arbitrary command execution. He reports:</p>
+ <blockquote cite="http://marc.theaimsgroup.com/?l=bugtraq&amp;m=110202047507273">
+ <p>The problem is compounded when you recognize that the main use of rssh and
+ scponly is to allow file transfers, which in turn allows a malicious user to
+ transfer and execute entire custom scripts on the remote machine.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <freebsdpr>ports/74633</freebsdpr>
+ <mlist msgid="20041202135143.GA7105@xc.net">http://marc.theaimsgroup.com/?l=bugtraq&amp;m=110202047507273</mlist>
+ </references>
+ <dates>
+ <discovery>2004-11-28</discovery>
+ <entry>2004-12-02</entry>
+ </dates>
+ </vuln>
+
<vuln vid="2b4d5288-447e-11d9-9ebb-000854d03344">
<topic>rockdodger -- buffer overflows</topic>
<affects>