Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 21 Jan 2003 16:23:52 +0100
From:      Stijn Hoop <stijn@win.tue.nl>
To:        Tod McQuillin <devin@spamcop.net>
Cc:        security@freebsd.org
Subject:   Re: CVS remote vulnerability
Message-ID:  <20030121152352.GG219@pcwin002.win.tue.nl>
In-Reply-To: <20030122001452.O455@glass.pun-pun.prv>
References:  <20030122001452.O455@glass.pun-pun.prv>

next in thread | previous in thread | raw e-mail | index | archive | help

--5Mfx4RzfBqgnTE/w
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Wed, Jan 22, 2003 at 12:16:21AM +0900, Tod McQuillin wrote:
>=20
> Heads up... http://security.e-matters.de/advisories/012003.html
>=20
> I don't know if FreeBSD is affected but the advisory claims "I was also
> able to create proof of concept code that uses this vulnerability to
> execute arbitrary shell commands on BSD servers".

Hmmm, I don't get this:

The advisory claims that 'This does not apply to :pserver: method only',
but what other method exists where you don't have to have a shell account?
In other words, I have a CVS server where people use :ext: with
CVS_RSH=3Dssh. How can one compromise this setup without compromising SSH?

Or am I missing other CVS access methods?

--Stijn

--=20
SIGSIG -- signature too long (core dumped)

--5Mfx4RzfBqgnTE/w
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (FreeBSD)

iD8DBQE+LWYIY3r/tLQmfWcRAhhlAJ4o5QKpB/GeAihJbnXQIeKAnhYtdgCeIk9F
asQKxzwoAz+zkh4nf47DSCI=
=PhkA
-----END PGP SIGNATURE-----

--5Mfx4RzfBqgnTE/w--

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030121152352.GG219>