CVE-2019-7283

An issue was discovered in rcp in NetKit through 0.17. For an rcp operation, the server chooses which files/directories are sent to the client. However, the rcp client only performs cursory validation of the object name returned. A malicious rsh server (or Man-in-The-Middle attacker) can overwrite arbitrary files in a directory on the rcp client machine. This is similar to CVE-2019-6111.
References
Link Resource
https://bugs.debian.org/920486 Exploit Issue Tracking Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/11/msg00016.html Mailing List Third Party Advisory
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt Mitigation Not Applicable Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:netkit:netkit:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-01-31 18:29

Updated : 2024-02-28 16:48


NVD link : CVE-2019-7283

Mitre link : CVE-2019-7283

CVE.ORG link : CVE-2019-7283


JSON object : View

Products Affected

netkit

  • netkit

debian

  • debian_linux