Vulnerability Description
The unison command in scponly before 4.0 does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via the (1) -rshcmd or (2) -sshcmd flags.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Scponly | Scponly | 2.0 |
| Gentoo | Linux | All versions |
References
- http://marc.info/?l=bugtraq&m=110202047507273&w=2
- http://marc.info/?l=bugtraq&m=110581113814623&w=2
- http://www.gentoo.org/security/en/glsa/glsa-200412-01.xml
- http://www.securityfocus.com/bid/11791ExploitPatchVendor Advisory
- http://www.sublimation.org/scponly/#relnotes
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18362
- http://marc.info/?l=bugtraq&m=110202047507273&w=2
- http://marc.info/?l=bugtraq&m=110581113814623&w=2
- http://www.gentoo.org/security/en/glsa/glsa-200412-01.xml
- http://www.securityfocus.com/bid/11791ExploitPatchVendor Advisory
- http://www.sublimation.org/scponly/#relnotes
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18362
FAQ
What is CVE-2004-1162?
CVE-2004-1162 is a vulnerability with a CVSS score of 7.5 (HIGH). The unison command in scponly before 4.0 does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary ...
How severe is CVE-2004-1162?
CVE-2004-1162 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1162?
Check the references section above for vendor advisories and patch information. Affected products include: Scponly Scponly, Gentoo Linux.