First published: Fri Dec 10 2004(Updated: )
The unison command in scponly before 4.0 does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via the (1) -rshcmd or (2) -sshcmd flags.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Scponly Scponly | =2.1 | |
Scponly Scponly | =3.5 | |
Scponly Scponly | =2.3 | |
Scponly Scponly | =3.0 | |
Scponly Scponly | =3.11 | |
Scponly Scponly | =2.4 | |
Scponly Scponly | =2.0 | |
Scponly Scponly | =3.9 | |
Scponly Scponly | =3.8 | |
Gentoo Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.