Date: Tue, 21 Jan 2003 16:23:52 +0100 From: Stijn Hoop <stijn@win.tue.nl> To: Tod McQuillin <devin@spamcop.net> Cc: security@freebsd.org Subject: Re: CVS remote vulnerability Message-ID: <20030121152352.GG219@pcwin002.win.tue.nl> In-Reply-To: <20030122001452.O455@glass.pun-pun.prv> References: <20030122001452.O455@glass.pun-pun.prv>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] On Wed, Jan 22, 2003 at 12:16:21AM +0900, Tod McQuillin wrote: > > Heads up... http://security.e-matters.de/advisories/012003.html > > I don't know if FreeBSD is affected but the advisory claims "I was also > able to create proof of concept code that uses this vulnerability to > execute arbitrary shell commands on BSD servers". Hmmm, I don't get this: The advisory claims that 'This does not apply to :pserver: method only', but what other method exists where you don't have to have a shell account? In other words, I have a CVS server where people use :ext: with CVS_RSH=ssh. How can one compromise this setup without compromising SSH? Or am I missing other CVS access methods? --Stijn -- SIGSIG -- signature too long (core dumped) [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (FreeBSD) iD8DBQE+LWYIY3r/tLQmfWcRAhhlAJ4o5QKpB/GeAihJbnXQIeKAnhYtdgCeIk9F asQKxzwoAz+zkh4nf47DSCI= =PhkA -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030121152352.GG219>
