Debian Security Advisory

DSA-969-1 scponly -- design error

Date Reported:
13 Feb 2006
Affected Packages:
scponly
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 344418.
In Mitre's CVE dictionary: CVE-2005-4532, CVE-2005-4533.
More information:

Max Vozeler discovered a vulnerability in scponly, a utility to restrict user commands to scp and sftp, that could lead to the execution of arbitrary commands as root. The system is only vulnerable if the program scponlyc is installed setuid root and if regular users have shell access to the machine.

The old stable distribution (woody) does not contain an scponly package.

For the stable distribution (sarge) this problem has been fixed in version 4.0-1sarge1.

For the unstable distribution (sid) this problem has been fixed in version 4.6-1.

We recommend that you upgrade your scponly package.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge1.dsc
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge1.diff.gz
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge1_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge1_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge1_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge1_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge1_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge1_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge1_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge1_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge1_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/s/scponly/scponly_4.0-1sarge1_sparc.deb

MD5 checksums of the listed files are available in the original advisory.