Package: rssh
Version: 2.2.3-3
Severity: critical
Tags: security

Hey Jesus,

rssh 2.3.0 has been released by Derek to fix the arbitrary chroot()
problem and privilege escalation we've mailed about (CVE-2005-3345)

http://www.pizzashack.org/rssh/index.shtml:
> Dec 18, 2005
> 
> rssh v2.3.0 released today!
> 
> Important Security Notice:
> 
> Max Vozeler has reported a problem whereby rssh can allow users who
> have shell access to systems where rssh is installed (and
> rssh_chroot_helper is installed SUID) to gain root access to the
> system, due to the ability to chroot to arbitrary locations. There are
> a lot of potentially mitigating factors, but to be safe you should
> upgrade immediately. This bug affects all versions of rssh from v2.0.0
> to v2.2.3, so please upgrade now!
> 
> The 2.3.0 release of rssh fixes this problem, by forcing the chroot
> helper to re-parse the config file to decide where to chroot(2) to.
> Users with shell access to the system can not subvert the chroot
> location, and may not be able to chroot at all depending on the
> configuration of rssh, which solves the problem.

Having rssh installed and rssh_chroot_helper setuid root is sufficient
for this bug to be exploitable, hence severity critical.

cheers,
Max


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to