Date: Tue, 21 Jan 2003 16:23:52 +0100 From: Stijn Hoop <stijn@win.tue.nl> To: Tod McQuillin <devin@spamcop.net> Cc: security@freebsd.org Subject: Re: CVS remote vulnerability Message-ID: <20030121152352.GG219@pcwin002.win.tue.nl> In-Reply-To: <20030122001452.O455@glass.pun-pun.prv> References: <20030122001452.O455@glass.pun-pun.prv>
next in thread | previous in thread | raw e-mail | index | archive | help
--5Mfx4RzfBqgnTE/w Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Wed, Jan 22, 2003 at 12:16:21AM +0900, Tod McQuillin wrote: >=20 > Heads up... http://security.e-matters.de/advisories/012003.html >=20 > I don't know if FreeBSD is affected but the advisory claims "I was also > able to create proof of concept code that uses this vulnerability to > execute arbitrary shell commands on BSD servers". Hmmm, I don't get this: The advisory claims that 'This does not apply to :pserver: method only', but what other method exists where you don't have to have a shell account? In other words, I have a CVS server where people use :ext: with CVS_RSH=3Dssh. How can one compromise this setup without compromising SSH? Or am I missing other CVS access methods? --Stijn --=20 SIGSIG -- signature too long (core dumped) --5Mfx4RzfBqgnTE/w Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (FreeBSD) iD8DBQE+LWYIY3r/tLQmfWcRAhhlAJ4o5QKpB/GeAihJbnXQIeKAnhYtdgCeIk9F asQKxzwoAz+zkh4nf47DSCI= =PhkA -----END PGP SIGNATURE----- --5Mfx4RzfBqgnTE/w-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030121152352.GG219>