From owner-freebsd-security Tue Jan 21 7:23:41 2003 Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 7703E37B401 for ; Tue, 21 Jan 2003 07:23:39 -0800 (PST) Received: from pcwin002.win.tue.nl (pcwin002.win.tue.nl [131.155.71.72]) by mx1.FreeBSD.org (Postfix) with ESMTP id 5001543E4A for ; Tue, 21 Jan 2003 07:23:38 -0800 (PST) (envelope-from stijn@pcwin002.win.tue.nl) Received: from pcwin002.win.tue.nl (orb_rules@localhost [127.0.0.1]) by pcwin002.win.tue.nl (8.12.6/8.12.6) with ESMTP id h0LFNqfw001205; Tue, 21 Jan 2003 16:23:52 +0100 (CET) (envelope-from stijn@pcwin002.win.tue.nl) Received: (from stijn@localhost) by pcwin002.win.tue.nl (8.12.6/8.12.6/Submit) id h0LFNqrJ001204; Tue, 21 Jan 2003 16:23:52 +0100 (CET) Date: Tue, 21 Jan 2003 16:23:52 +0100 From: Stijn Hoop To: Tod McQuillin Cc: security@freebsd.org Subject: Re: CVS remote vulnerability Message-ID: <20030121152352.GG219@pcwin002.win.tue.nl> References: <20030122001452.O455@glass.pun-pun.prv> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="5Mfx4RzfBqgnTE/w" Content-Disposition: inline In-Reply-To: <20030122001452.O455@glass.pun-pun.prv> User-Agent: Mutt/1.4i X-Bright-Idea: Let's abolish HTML mail! Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org --5Mfx4RzfBqgnTE/w Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Wed, Jan 22, 2003 at 12:16:21AM +0900, Tod McQuillin wrote: >=20 > Heads up... http://security.e-matters.de/advisories/012003.html >=20 > I don't know if FreeBSD is affected but the advisory claims "I was also > able to create proof of concept code that uses this vulnerability to > execute arbitrary shell commands on BSD servers". Hmmm, I don't get this: The advisory claims that 'This does not apply to :pserver: method only', but what other method exists where you don't have to have a shell account? In other words, I have a CVS server where people use :ext: with CVS_RSH=3Dssh. How can one compromise this setup without compromising SSH? Or am I missing other CVS access methods? --Stijn --=20 SIGSIG -- signature too long (core dumped) --5Mfx4RzfBqgnTE/w Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (FreeBSD) iD8DBQE+LWYIY3r/tLQmfWcRAhhlAJ4o5QKpB/GeAihJbnXQIeKAnhYtdgCeIk9F asQKxzwoAz+zkh4nf47DSCI= =PhkA -----END PGP SIGNATURE----- --5Mfx4RzfBqgnTE/w-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message