Debian Security Advisory

DSA-918-1 osh -- programming error

Date Reported:
09 Dec 2005
Affected Packages:
osh
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 338312.
In Mitre's CVE dictionary: CVE-2005-3346, CVE-2005-3533.
More information:

Several security related problems have been discovered in osh, the operator's shell for executing defined programs in a privileged environment. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities:

  • CVE-2005-3346

    Charles Stevenson discovered a bug in the substitution of variables that allows a local attacker to open a root shell.

  • CVE-2005-3533

    Solar Eclipse discovered a buffer overflow caused by the current working directory plus a filename that could be used to execute arbitrary code and e.g. open a root shell.

For the old stable distribution (woody) these problems have been fixed in version 1.7-11woody2.

For the stable distribution (sarge) these problems have been fixed in version 1.7-13sarge1.

For the unstable distribution (sid) these problems have been fixed in version 1.7-15, however, the package has been removed entirely.

We recommend that you upgrade your osh package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2.dsc
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2.diff.gz
http://security.debian.org/pool/updates/main/o/osh/osh_1.7.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_sparc.deb

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1.dsc
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1.diff.gz
http://security.debian.org/pool/updates/main/o/osh/osh_1.7.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_sparc.deb

MD5 checksums of the listed files are available in the original advisory.