DSA-1473-1 scponly -- design flaw

Related Vulnerabilities: CVE-2007-6350   CVE-2007-6415  

Joachim Breitner discovered that Subversion support in scponly is inherently insecure, allowing execution of arbitrary commands. Further investigation showed that rsync and Unison support suffer from similar issues. This set of issues has been assigned CVE-2007-6350. In addition, it was discovered that it was possible to invoke scp with certain options that may lead to the execution of arbitrary commands (CVE-2007-6415). This update removes Subversion, rsync and Unison support from the scponly package, and prevents scp from being invoked with the dangerous options. For the old stable distribution (sarge), these problems have been fixed in version 4.0-1sarge2. For the stable distribution (etch), these problems have been fixed in version 4.6-1etch1. The unstable distribution (sid) will be fixed soon. We recommend that you upgrade your scponly package.

Debian Security Advisory

DSA-1473-1 scponly -- design flaw

Date Reported:
21 Jan 2008
Affected Packages:
scponly
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 437148.
In Mitre's CVE dictionary: CVE-2007-6350, CVE-2007-6415.
More information:

Joachim Breitner discovered that Subversion support in scponly is inherently insecure, allowing execution of arbitrary commands. Further investigation showed that rsync and Unison support suffer from similar issues. This set of issues has been assigned CVE-2007-6350.

In addition, it was discovered that it was possible to invoke scp with certain options that may lead to the execution of arbitrary commands (CVE-2007-6415).

This update removes Subversion, rsync and Unison support from the scponly package, and prevents scp from being invoked with the dangerous options.

For the old stable distribution (sarge), these problems have been fixed in version 4.0-1sarge2.

For the stable distribution (etch), these problems have been fixed in version 4.6-1etch4.

The unstable distribution (sid) will be fixed soon.

We recommend that you upgrade your scponly package.

Fixed in:

Debian GNU/Linux 3.1 (oldstable)

Source:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0.orig.tar.gz
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2.diff.gz
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2.dsc
Alpha:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_arm.deb
HP Precision:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_ia64.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_m68k.deb
Big-endian MIPS:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_mips.deb
Little-endian MIPS:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge2_sparc.deb

Debian GNU/Linux 4.0 (stable)

Source:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch4.diff.gz
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch4.dsc
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch4_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch4_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch4_arm.deb
HP Precision:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch4_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch4_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch4_ia64.deb
Big-endian MIPS:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch4_mips.deb
Little-endian MIPS:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch4_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch4_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch4_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.6-1etch4_sparc.deb

MD5 checksums of the listed files are available in the original advisory.