scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute arbitrary code by invoking scp, as implemented by OpenSSH, with the -F and -o options.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.debian.org/security/2008/dsa-1473 | vendor advisory |
http://security.gentoo.org/glsa/glsa-200802-06.xml | vendor advisory |
http://bugs.gentoo.org/show_bug.cgi?id=203099 | |
http://secunia.com/advisories/28944 | third party advisory |
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html | vendor advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148 | exploit |
http://secunia.com/advisories/28538 | patch vendor advisory third party advisory |
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00546.html | vendor advisory |
http://secunia.com/advisories/28981 | third party advisory |