First published: Thu Jan 31 2019(Updated: )
In NetKit through 0.17, rcp.c in the rcp client allows remote rsh servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side. This is similar to CVE-2018-20685.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netkit | <=0.17 | |
Debian Linux | =9.0 | |
Red Hat Fedora | =34 | |
Red Hat Fedora | =35 | |
Red Hat Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7282 has been classified as a medium severity vulnerability due to its potential to allow unauthorized access to file permissions.
To fix CVE-2019-7282, update the NetKit package to version 0.18 or later, or apply the relevant patches provided by your Linux distribution.
CVE-2019-7282 affects NetKit versions up to 0.17 and specific versions of Debian and Fedora distributions.
An attacker can exploit CVE-2019-7282 to bypass access restrictions by manipulating file names, potentially compromising directory permissions on the client side.
A possible workaround for CVE-2019-7282 includes disabling the use of rcp if not necessary, to mitigate the risk of exploitation.