[openssh] [CVE-2008-1657] possibility to bypass global "ForceCommand" directive
Bug #227322 reported by
disabled.user
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
openssh (Ubuntu) |
Fix Released
|
Undecided
|
Colin Watson | ||
Gutsy |
Fix Released
|
Low
|
Kees Cook | ||
Hardy |
Fix Released
|
Undecided
|
Colin Watson | ||
Intrepid |
Fix Released
|
Undecided
|
Colin Watson |
Bug Description
Quoting CVE-2008-1657:
"OpenSSH before 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file."
To post a comment you must log in.
Already fixed in Hardy/Intrepid and backported to earlier releases. Please look at the changelog as well as just the version number!
openssh (1:4.7p1-8) unstable; urgency=high
* Fill in CVE identifier for security vulnerability fixed in 1:4.7p1-5. www.securityfoc us.com/ bid/28531/ info). eptorCheck, which had
* Rename KeepAlive to TCPKeepAlive in sshd_config, cleaning up from old
configurations (LP: #211400).
* Tweak scp's reporting of filenames in verbose mode to be a bit less
confusing with spaces (thanks, Nicolas Valcárcel; LP: #89945).
* Backport from 4.9p1:
- Ignore ~/.ssh/rc if a sshd_config ForceCommand is specified (see
http://
- Add no-user-rc authorized_keys option to disable execution of
~/.ssh/rc.
* Backport from Simon Wilkinson's GSSAPI key exchange patch for 5.0p1:
- Add code to actually implement GSSAPIStrictAcc
somehow been omitted from a previous version of this patch (closes:
#474246).
-- Colin Watson <email address hidden> Sun, 06 Apr 2008 12:34:19 +0100
I believe this is already on the security team's list for earlier releases.