Vulnerabilites related to scponly - scponly
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The unison command in scponly before 4.0 does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via the (1) -rshcmd or (2) -sshcmd flags.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:scponly:scponly:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A74980DC-9A5B-4959-8193-1D7BE85CAEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0863C35F-6061-426B-B656-E7B4A02D3E95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C684457B-957E-41F0-A982-7D5266730570",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C59B9EE9-29EA-4513-8E35-4B41CE79E964",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B689CE-F02B-4315-9E74-BC360EAFB937",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3262EA-F693-439B-922D-3F0DA09D0753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B37D1F24-B45D-4217-972E-61BED886275A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "71D3E1C8-ADCB-4A5F-8078-66942E36DF6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "190FB980-F17F-43A9-8DA4-B2A99E29DF3E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "647BA336-5538-4972-9271-383A0EC9378E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The unison command in scponly before 4.0 does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via the (1) -rshcmd or (2) -sshcmd flags."
    }
  ],
  "id": "CVE-2004-1162",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-01-10T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=110202047507273\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=110581113814623\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200412-01.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/11791"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.sublimation.org/scponly/#relnotes"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18362"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=110202047507273\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=110581113814623\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200412-01.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/11791"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.sublimation.org/scponly/#relnotes"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18362"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-12-28 01:03
Modified
2025-04-03 01:03
Severity ?
Summary
Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via "getopt" style argument specifications, which are not filtered.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:scponly:scponly:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A74980DC-9A5B-4959-8193-1D7BE85CAEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0863C35F-6061-426B-B656-E7B4A02D3E95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B689CE-F02B-4315-9E74-BC360EAFB937",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3262EA-F693-439B-922D-3F0DA09D0753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B37D1F24-B45D-4217-972E-61BED886275A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "71D3E1C8-ADCB-4A5F-8078-66942E36DF6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "190FB980-F17F-43A9-8DA4-B2A99E29DF3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "298502A9-5E53-4CBE-BCCA-6D86EFDD3BF3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via \"getopt\" style argument specifications, which are not filtered."
    }
  ],
  "id": "CVE-2005-4533",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-28T01:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18223"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18236"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sublimation.org/scponly/#relnotes"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/16051"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18236"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sublimation.org/scponly/#relnotes"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/16051"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23875"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-12-14 20:46
Modified
2025-04-09 00:30
Severity ?
Summary
scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute code by invoking dangerous subcommands including (1) unison, (2) rsync, (3) svn, and (4) svnserve, as originally demonstrated by creating a Subversion (SVN) repository with malicious hooks, then using svn to trigger execution of those hooks.
References
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148
cve@mitre.orghttp://bugs.gentoo.org/show_bug.cgi?id=201726
cve@mitre.orghttp://osvdb.org/44137
cve@mitre.orghttp://scponly.cvs.sourceforge.net/scponly/scponly/SECURITY?view=markup
cve@mitre.orghttp://secunia.com/advisories/28123Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28538Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28944Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28981Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200802-06.xml
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1473
cve@mitre.orghttp://www.securityfocus.com/bid/26900
cve@mitre.orghttp://www.securitytracker.com/id?1019103
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/4243Vendor Advisory
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-February/msg00546.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=201726
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/44137
af854a3a-2127-422b-91ae-364da2661108http://scponly.cvs.sourceforge.net/scponly/scponly/SECURITY?view=markup
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28123Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28538Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28944Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28981Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200802-06.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1473
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/26900
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1019103
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/4243Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00546.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html
Impacted products
Vendor Product Version
scponly scponly *
scponly scponly 4.2
scponly scponly 4.3
scponly scponly 4.4
scponly scponly 4.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:scponly:scponly:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "117508D1-B46B-42BC-B782-FA07405AD92F",
              "versionEndIncluding": "4.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9103A4C8-9706-4C9A-872A-8655A3E2C33D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9647F5-2FA5-44ED-9D36-3C32BAB26CED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDE94CA7-C407-4C32-A012-71547850CA64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9895B767-8B21-4992-9C78-BB682E50658C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute code by invoking dangerous subcommands including (1) unison, (2) rsync, (3) svn, and (4) svnserve, as originally demonstrated by creating a Subversion (SVN) repository with malicious hooks, then using svn to trigger execution of those hooks."
    },
    {
      "lang": "es",
      "value": "scponly versiones 4.6 y anteriores, permite a los usuarios autenticados remotos omitir las restricciones previstas y ejecutar c\u00f3digo invocando subcomandos peligrosos incluyendo (1) unison, (2) rsync, (3) svn, y (4) svnserve, como es demostrado originalmente mediante la creaci\u00f3n de un repositorio Subversion (SVN) con ganchos (hooks) maliciosos, luego usando svn para desencadenar la ejecuci\u00f3n de esos ganchos (hooks)."
    }
  ],
  "id": "CVE-2007-6350",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.5,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-12-14T20:46:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=201726"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/44137"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://scponly.cvs.sourceforge.net/scponly/scponly/SECURITY?view=markup"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28123"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28538"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28944"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28981"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200802-06.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1473"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/26900"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019103"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/4243"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00546.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=201726"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/44137"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://scponly.cvs.sourceforge.net/scponly/scponly/SECURITY?view=markup"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28123"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28538"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28944"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28981"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200802-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1473"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/26900"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019103"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/4243"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00546.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        },
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-12-28 01:03
Modified
2025-04-03 01:03
Severity ?
Summary
scponlyc in scponly 4.1 and earlier, when the operating system supports LD_PRELOAD mechanisms, allows local users to execute arbitrary code with root privileges by creating a chroot directory in their home directory, hard linking to a system setuid application, and using a modified LD_PRELOAD to modify expected function calls in the setuid application.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "54CA4642-65F9-459B-A89A-DEC2D375E6B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8191863F-F89D-41E8-91F8-8FC1D3EB25D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7770880B-A0E2-49C8-A9BB-D217A6956400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "633BCC6F-3E3E-43F9-B7B6-E83BCB4D5048",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDBF494D-6888-4A67-9E91-B7844C3FCD7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCDEA7D6-EB9E-465A-BA6B-E1584A413544",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B37D1F24-B45D-4217-972E-61BED886275A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "71D3E1C8-ADCB-4A5F-8078-66942E36DF6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "190FB980-F17F-43A9-8DA4-B2A99E29DF3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4AF8092-4E2B-474C-9B5D-1252A2A3624C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "298502A9-5E53-4CBE-BCCA-6D86EFDD3BF3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "scponlyc in scponly 4.1 and earlier, when the operating system supports LD_PRELOAD mechanisms, allows local users to execute arbitrary code with root privileges by creating a chroot directory in their home directory, hard linking to a system setuid application, and using a modified LD_PRELOAD to modify expected function calls in the setuid application."
    }
  ],
  "id": "CVE-2005-4532",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-28T01:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18223"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18236"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18829"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sublimation.org/scponly/#relnotes"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-969"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/16051"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23874"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18236"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18829"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sublimation.org/scponly/#relnotes"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-969"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/16051"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23874"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2003-04-22 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
scponly does not properly verify the path when finding the (1) scp or (2) sftp-server programs, which could allow remote authenticated users to bypass access controls by uploading malicious programs and modifying the PATH variable in $HOME/.ssh/environment to locate those programs.
Impacted products
Vendor Product Version
scponly scponly 2.3
scponly scponly 2.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:scponly:scponly:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C684457B-957E-41F0-A982-7D5266730570",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:scponly:scponly:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C59B9EE9-29EA-4513-8E35-4B41CE79E964",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "scponly does not properly verify the path when finding the (1) scp or (2) sftp-server programs, which could allow remote authenticated users to bypass access controls by uploading malicious programs and modifying the PATH variable in $HOME/.ssh/environment to locate those programs."
    },
    {
      "lang": "es",
      "value": "scponly no verifica adecuadamente la ruta de los programas scp o sftp-server, lo que podr\u00eda permitir a usuarios remotos autenticados eludir los controles de acceso cargando programas maliciosos y modificando la variable PATH en el entorno $HOME/.ssh/ para localizar esos programas."
    }
  ],
  "id": "CVE-2002-1469",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2003-04-22T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://online.securityfocus.com/archive/1/288245"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/9913.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/5526"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.sublimation.org/scponly/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://online.securityfocus.com/archive/1/288245"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/9913.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/5526"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.sublimation.org/scponly/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2007-6350 (GCVE-0-2007-6350)
Vulnerability from cvelistv5
Published
2007-12-14 20:00
Modified
2024-08-07 16:02
Severity ?
CWE
  • n/a
Summary
scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute code by invoking dangerous subcommands including (1) unison, (2) rsync, (3) svn, and (4) svnserve, as originally demonstrated by creating a Subversion (SVN) repository with malicious hooks, then using svn to trigger execution of those hooks.
References
http://www.securityfocus.com/bid/26900 vdb-entry, x_refsource_BID
http://www.debian.org/security/2008/dsa-1473 vendor-advisory, x_refsource_DEBIAN
http://bugs.gentoo.org/show_bug.cgi?id=201726 x_refsource_CONFIRM
http://scponly.cvs.sourceforge.net/scponly/scponly/SECURITY?view=markup x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/4243 vdb-entry, x_refsource_VUPEN
http://security.gentoo.org/glsa/glsa-200802-06.xml vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/28123 third-party-advisory, x_refsource_SECUNIA
http://osvdb.org/44137 vdb-entry, x_refsource_OSVDB
http://www.securitytracker.com/id?1019103 vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/28944 third-party-advisory, x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html vendor-advisory, x_refsource_FEDORA
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148 x_refsource_CONFIRM
http://secunia.com/advisories/28538 third-party-advisory, x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00546.html vendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/28981 third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:02:36.466Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "26900",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/26900"
          },
          {
            "name": "DSA-1473",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1473"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=201726"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://scponly.cvs.sourceforge.net/scponly/scponly/SECURITY?view=markup"
          },
          {
            "name": "ADV-2007-4243",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/4243"
          },
          {
            "name": "GLSA-200802-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200802-06.xml"
          },
          {
            "name": "28123",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28123"
          },
          {
            "name": "44137",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/44137"
          },
          {
            "name": "1019103",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019103"
          },
          {
            "name": "28944",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28944"
          },
          {
            "name": "FEDORA-2008-1728",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148"
          },
          {
            "name": "28538",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28538"
          },
          {
            "name": "FEDORA-2008-1743",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00546.html"
          },
          {
            "name": "28981",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28981"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-09-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute code by invoking dangerous subcommands including (1) unison, (2) rsync, (3) svn, and (4) svnserve, as originally demonstrated by creating a Subversion (SVN) repository with malicious hooks, then using svn to trigger execution of those hooks."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-12-19T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "26900",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/26900"
        },
        {
          "name": "DSA-1473",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1473"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=201726"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://scponly.cvs.sourceforge.net/scponly/scponly/SECURITY?view=markup"
        },
        {
          "name": "ADV-2007-4243",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/4243"
        },
        {
          "name": "GLSA-200802-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200802-06.xml"
        },
        {
          "name": "28123",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28123"
        },
        {
          "name": "44137",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/44137"
        },
        {
          "name": "1019103",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019103"
        },
        {
          "name": "28944",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28944"
        },
        {
          "name": "FEDORA-2008-1728",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148"
        },
        {
          "name": "28538",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28538"
        },
        {
          "name": "FEDORA-2008-1743",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00546.html"
        },
        {
          "name": "28981",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28981"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6350",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute code by invoking dangerous subcommands including (1) unison, (2) rsync, (3) svn, and (4) svnserve, as originally demonstrated by creating a Subversion (SVN) repository with malicious hooks, then using svn to trigger execution of those hooks."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "26900",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/26900"
            },
            {
              "name": "DSA-1473",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1473"
            },
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=201726",
              "refsource": "CONFIRM",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=201726"
            },
            {
              "name": "http://scponly.cvs.sourceforge.net/scponly/scponly/SECURITY?view=markup",
              "refsource": "CONFIRM",
              "url": "http://scponly.cvs.sourceforge.net/scponly/scponly/SECURITY?view=markup"
            },
            {
              "name": "ADV-2007-4243",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/4243"
            },
            {
              "name": "GLSA-200802-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200802-06.xml"
            },
            {
              "name": "28123",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28123"
            },
            {
              "name": "44137",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/44137"
            },
            {
              "name": "1019103",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019103"
            },
            {
              "name": "28944",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28944"
            },
            {
              "name": "FEDORA-2008-1728",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148"
            },
            {
              "name": "28538",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28538"
            },
            {
              "name": "FEDORA-2008-1743",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00546.html"
            },
            {
              "name": "28981",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28981"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6350",
    "datePublished": "2007-12-14T20:00:00",
    "dateReserved": "2007-12-14T00:00:00",
    "dateUpdated": "2024-08-07T16:02:36.466Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-1162 (GCVE-0-2004-1162)
Vulnerability from cvelistv5
Published
2004-12-10 05:00
Modified
2024-08-08 00:39
Severity ?
CWE
  • n/a
Summary
The unison command in scponly before 4.0 does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via the (1) -rshcmd or (2) -sshcmd flags.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:39:00.859Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-200412-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200412-01.xml"
          },
          {
            "name": "20050115 Re: rssh and scponly arbitrary command execution",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=110581113814623\u0026w=2"
          },
          {
            "name": "20041202 rssh and scponly arbitrary command execution",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=110202047507273\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sublimation.org/scponly/#relnotes"
          },
          {
            "name": "scponly-commandline-command-execution(18362)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18362"
          },
          {
            "name": "11791",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/11791"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-12-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The unison command in scponly before 4.0 does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via the (1) -rshcmd or (2) -sshcmd flags."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "GLSA-200412-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200412-01.xml"
        },
        {
          "name": "20050115 Re: rssh and scponly arbitrary command execution",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=110581113814623\u0026w=2"
        },
        {
          "name": "20041202 rssh and scponly arbitrary command execution",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=110202047507273\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sublimation.org/scponly/#relnotes"
        },
        {
          "name": "scponly-commandline-command-execution(18362)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18362"
        },
        {
          "name": "11791",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/11791"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1162",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The unison command in scponly before 4.0 does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via the (1) -rshcmd or (2) -sshcmd flags."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-200412-01",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200412-01.xml"
            },
            {
              "name": "20050115 Re: rssh and scponly arbitrary command execution",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=110581113814623\u0026w=2"
            },
            {
              "name": "20041202 rssh and scponly arbitrary command execution",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=110202047507273\u0026w=2"
            },
            {
              "name": "http://www.sublimation.org/scponly/#relnotes",
              "refsource": "CONFIRM",
              "url": "http://www.sublimation.org/scponly/#relnotes"
            },
            {
              "name": "scponly-commandline-command-execution(18362)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18362"
            },
            {
              "name": "11791",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/11791"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1162",
    "datePublished": "2004-12-10T05:00:00",
    "dateReserved": "2004-12-09T00:00:00",
    "dateUpdated": "2024-08-08T00:39:00.859Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-1469 (GCVE-0-2002-1469)
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 03:26
Severity ?
CWE
  • n/a
Summary
scponly does not properly verify the path when finding the (1) scp or (2) sftp-server programs, which could allow remote authenticated users to bypass access controls by uploading malicious programs and modifying the PATH variable in $HOME/.ssh/environment to locate those programs.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:26:28.304Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sublimation.org/scponly/"
          },
          {
            "name": "scponly-ssh-env-upload(9913)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/9913.php"
          },
          {
            "name": "20020820 vulnerabilities in scponly",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://online.securityfocus.com/archive/1/288245"
          },
          {
            "name": "5526",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5526"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-08-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "scponly does not properly verify the path when finding the (1) scp or (2) sftp-server programs, which could allow remote authenticated users to bypass access controls by uploading malicious programs and modifying the PATH variable in $HOME/.ssh/environment to locate those programs."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2003-03-21T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sublimation.org/scponly/"
        },
        {
          "name": "scponly-ssh-env-upload(9913)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/9913.php"
        },
        {
          "name": "20020820 vulnerabilities in scponly",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://online.securityfocus.com/archive/1/288245"
        },
        {
          "name": "5526",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5526"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1469",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "scponly does not properly verify the path when finding the (1) scp or (2) sftp-server programs, which could allow remote authenticated users to bypass access controls by uploading malicious programs and modifying the PATH variable in $HOME/.ssh/environment to locate those programs."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.sublimation.org/scponly/",
              "refsource": "CONFIRM",
              "url": "http://www.sublimation.org/scponly/"
            },
            {
              "name": "scponly-ssh-env-upload(9913)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/9913.php"
            },
            {
              "name": "20020820 vulnerabilities in scponly",
              "refsource": "BUGTRAQ",
              "url": "http://online.securityfocus.com/archive/1/288245"
            },
            {
              "name": "5526",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5526"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1469",
    "datePublished": "2004-09-01T04:00:00",
    "dateReserved": "2003-02-05T00:00:00",
    "dateUpdated": "2024-08-08T03:26:28.304Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4533 (GCVE-0-2005-4533)
Vulnerability from cvelistv5
Published
2005-12-28 01:00
Modified
2024-08-07 23:46
Severity ?
CWE
  • n/a
Summary
Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via "getopt" style argument specifications, which are not filtered.
References
http://secunia.com/advisories/18223 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/16051 vdb-entry, x_refsource_BID
http://secunia.com/advisories/18236 third-party-advisory, x_refsource_SECUNIA
http://sublimation.org/scponly/#relnotes x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml vendor-advisory, x_refsource_GENTOO
https://exchange.xforce.ibmcloud.com/vulnerabilities/23875 vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:46:05.517Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "18223",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18223"
          },
          {
            "name": "16051",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16051"
          },
          {
            "name": "18236",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18236"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sublimation.org/scponly/#relnotes"
          },
          {
            "name": "GLSA-200512-17",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml"
          },
          {
            "name": "scponly-escape-shell-restrictions(23875)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23875"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via \"getopt\" style argument specifications, which are not filtered."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-11T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "18223",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18223"
        },
        {
          "name": "16051",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16051"
        },
        {
          "name": "18236",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18236"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sublimation.org/scponly/#relnotes"
        },
        {
          "name": "GLSA-200512-17",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml"
        },
        {
          "name": "scponly-escape-shell-restrictions(23875)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23875"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4533",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via \"getopt\" style argument specifications, which are not filtered."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "18223",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18223"
            },
            {
              "name": "16051",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16051"
            },
            {
              "name": "18236",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18236"
            },
            {
              "name": "http://sublimation.org/scponly/#relnotes",
              "refsource": "CONFIRM",
              "url": "http://sublimation.org/scponly/#relnotes"
            },
            {
              "name": "GLSA-200512-17",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml"
            },
            {
              "name": "scponly-escape-shell-restrictions(23875)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23875"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4533",
    "datePublished": "2005-12-28T01:00:00",
    "dateReserved": "2005-12-28T00:00:00",
    "dateUpdated": "2024-08-07T23:46:05.517Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4532 (GCVE-0-2005-4532)
Vulnerability from cvelistv5
Published
2005-12-28 01:00
Modified
2024-08-07 23:46
Severity ?
CWE
  • n/a
Summary
scponlyc in scponly 4.1 and earlier, when the operating system supports LD_PRELOAD mechanisms, allows local users to execute arbitrary code with root privileges by creating a chroot directory in their home directory, hard linking to a system setuid application, and using a modified LD_PRELOAD to modify expected function calls in the setuid application.
References
http://secunia.com/advisories/18223 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/16051 vdb-entry, x_refsource_BID
http://secunia.com/advisories/18236 third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-969 vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/18829 third-party-advisory, x_refsource_SECUNIA
http://sublimation.org/scponly/#relnotes x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml vendor-advisory, x_refsource_GENTOO
https://exchange.xforce.ibmcloud.com/vulnerabilities/23874 vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:46:05.538Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "18223",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18223"
          },
          {
            "name": "16051",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16051"
          },
          {
            "name": "18236",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18236"
          },
          {
            "name": "DSA-969",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-969"
          },
          {
            "name": "18829",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18829"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sublimation.org/scponly/#relnotes"
          },
          {
            "name": "GLSA-200512-17",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml"
          },
          {
            "name": "scponly-scponlyc-privilege-escalation(23874)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23874"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "scponlyc in scponly 4.1 and earlier, when the operating system supports LD_PRELOAD mechanisms, allows local users to execute arbitrary code with root privileges by creating a chroot directory in their home directory, hard linking to a system setuid application, and using a modified LD_PRELOAD to modify expected function calls in the setuid application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "18223",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18223"
        },
        {
          "name": "16051",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16051"
        },
        {
          "name": "18236",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18236"
        },
        {
          "name": "DSA-969",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-969"
        },
        {
          "name": "18829",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18829"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sublimation.org/scponly/#relnotes"
        },
        {
          "name": "GLSA-200512-17",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml"
        },
        {
          "name": "scponly-scponlyc-privilege-escalation(23874)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23874"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4532",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "scponlyc in scponly 4.1 and earlier, when the operating system supports LD_PRELOAD mechanisms, allows local users to execute arbitrary code with root privileges by creating a chroot directory in their home directory, hard linking to a system setuid application, and using a modified LD_PRELOAD to modify expected function calls in the setuid application."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "18223",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18223"
            },
            {
              "name": "16051",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16051"
            },
            {
              "name": "18236",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18236"
            },
            {
              "name": "DSA-969",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-969"
            },
            {
              "name": "18829",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18829"
            },
            {
              "name": "http://sublimation.org/scponly/#relnotes",
              "refsource": "CONFIRM",
              "url": "http://sublimation.org/scponly/#relnotes"
            },
            {
              "name": "GLSA-200512-17",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml"
            },
            {
              "name": "scponly-scponlyc-privilege-escalation(23874)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23874"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4532",
    "datePublished": "2005-12-28T01:00:00",
    "dateReserved": "2005-12-28T00:00:00",
    "dateUpdated": "2024-08-07T23:46:05.538Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}