Debian Security Advisory
DSA-918-1 osh -- programming error
- Date Reported:
- 09 Dec 2005
- Affected Packages:
- osh
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 338312.
In Mitre's CVE dictionary: CVE-2005-3346, CVE-2005-3533. - More information:
-
Several security related problems have been discovered in osh, the operator's shell for executing defined programs in a privileged environment. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities:
- CVE-2005-3346
Charles Stevenson discovered a bug in the substitution of variables that allows a local attacker to open a root shell.
- CVE-2005-3533
Solar Eclipse discovered a buffer overflow caused by the current working directory plus a filename that could be used to execute arbitrary code and e.g. open a root shell.
For the old stable distribution (woody) these problems have been fixed in version 1.7-11woody2.
For the stable distribution (sarge) these problems have been fixed in version 1.7-13sarge1.
For the unstable distribution (sid) these problems have been fixed in version 1.7-15, however, the package has been removed entirely.
We recommend that you upgrade your osh package.
- CVE-2005-3346
- Fixed in:
-
Debian GNU/Linux 3.0 (woody)
- Source:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2.dsc
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2.diff.gz
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7.orig.tar.gz
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_alpha.deb
- ARM:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_ia64.deb
- HPPA:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_sparc.deb
Debian GNU/Linux 3.1 (sarge)
- Source:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1.dsc
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1.diff.gz
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7.orig.tar.gz
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_ia64.deb
- HPPA:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_sparc.deb
MD5 checksums of the listed files are available in the original advisory.