ALT Linux Community general discussions
 help / color / mirror / Atom feed
* [Comm] Fwd: [SA18224] rssh "chroot" Directory Privilege Escalation Vulnerability
@ 2005-12-28 10:11 Michael Shigorin
  2005-12-31 11:10 ` [Comm] Fwd: [SA18224] rssh "chroot" Directory Privilege Escalation Vulnerability [JT] Vitaly Lipatov
  0 siblings, 1 reply; 2+ messages in thread
From: Michael Shigorin @ 2005-12-28 10:11 UTC (permalink / raw)
  To: community

	Здравствуйте.
Кто rssh недавно вспоминал?

----- Forwarded message from Secunia Security Advisories -----


TITLE:
rssh "chroot" Directory Privilege Escalation Vulnerability

SECUNIA ADVISORY ID:
SA18224

VERIFY ADVISORY:
http://secunia.com/advisories/18224/

CRITICAL:
Less critical

IMPACT:
Privilege escalation

WHERE:
Local system

SOFTWARE:
rssh 2.x
http://secunia.com/product/3604/

DESCRIPTION:
Max Vozeler has reported a vulnerability in rssh, which can be
exploited by malicious, local users to gain escalated privileges.

The vulnerability is caused due to a design error that allows
malicious users to use the affected application with arbitrary chroot
directories. 

The vulnerability is related to #1 in:
SA18223

Successful exploitation requires that "rssh_chroot_helper" is
installed setuid root.

The vulnerability has been reported in version 2.0.0 through 2.2.3.

SOLUTION:
Update to version 2.3.0.
http://www.pizzashack.org/rssh/downloads.shtml

PROVIDED AND/OR DISCOVERED BY:
Max Vozeler

ORIGINAL ADVISORY:
http://www.pizzashack.org/rssh/security.shtml

OTHER REFERENCES:
SA18223:
http://secunia.com/advisories/18223/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=

----------------------------------------------------------------------

----- End forwarded message -----

-- 
 ---- WBR, Michael Shigorin <mike@altlinux.ru>
  ------ Linux.Kiev http://www.linux.kiev.ua/


^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [Comm] Fwd: [SA18224] rssh "chroot" Directory Privilege Escalation Vulnerability [JT]
  2005-12-28 10:11 [Comm] Fwd: [SA18224] rssh "chroot" Directory Privilege Escalation Vulnerability Michael Shigorin
@ 2005-12-31 11:10 ` Vitaly Lipatov
  0 siblings, 0 replies; 2+ messages in thread
From: Vitaly Lipatov @ 2005-12-31 11:10 UTC (permalink / raw)
  To: community, shigorin

On Wednesday 28 December 2005 13:11, Michael Shigorin wrote:
> 	Здравствуйте.
> Кто rssh недавно вспоминал?
Я вспоминал. На мой взгляд это всё раздувание шума из ничего.
На мой взгляд вообще хорошо, что уязвимости обнаруживают. Значит 
программой кто-то пользуется. Было бы хуже, если бы до неё не 
было дела - точно была бы дырявая, как решето.

P.S. В Сизиф был отправлена новая версия, не имеющая уязвимости.

P.P.S.
И вообще те десятки сообщений о rssh, которые на меня обрушились, 
смахивают на DoS :)

-- 
Lav
Виталий Липатов
Санкт-Петербург
GNU! ALT Linux Team! WINE! LaTeX! LyX! http://freesource.info


^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2005-12-31 11:10 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2005-12-28 10:11 [Comm] Fwd: [SA18224] rssh "chroot" Directory Privilege Escalation Vulnerability Michael Shigorin
2005-12-31 11:10 ` [Comm] Fwd: [SA18224] rssh "chroot" Directory Privilege Escalation Vulnerability [JT] Vitaly Lipatov

ALT Linux Community general discussions

This inbox may be cloned and mirrored by anyone:

	git clone --mirror http://lore.altlinux.org/community/0 community/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 community community/ http://lore.altlinux.org/community \
		mandrake-russian@linuxteam.iplabs.ru community@lists.altlinux.org community@lists.altlinux.ru community@lists.altlinux.com
	public-inbox-index community

Example config snippet for mirrors.
Newsgroup available over NNTP:
	nntp://lore.altlinux.org/org.altlinux.lists.community


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git