The unison command in scponly before 4.0 does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via the (1) -rshcmd or (2) -sshcmd flags.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Nov 2024, 23:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=110202047507273&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=110581113814623&w=2 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200412-01.xml - | |
References | () http://www.securityfocus.com/bid/11791 - Exploit, Patch, Vendor Advisory | |
References | () http://www.sublimation.org/scponly/#relnotes - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/18362 - |
Information
Published : 2005-01-10 05:00
Updated : 2024-11-20 23:50
NVD link : CVE-2004-1162
Mitre link : CVE-2004-1162
CVE.ORG link : CVE-2004-1162
JSON object : View
Products Affected
gentoo
- linux
scponly
- scponly
CWE