First published: Thu Jan 31 2019(Updated: )
An issue was discovered in rcp in NetKit through 0.17. For an rcp operation, the server chooses which files/directories are sent to the client. However, the rcp client only performs cursory validation of the object name returned. A malicious rsh server (or Man-in-The-Middle attacker) can overwrite arbitrary files in a directory on the rcp client machine. This is similar to CVE-2019-6111.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netkit | <=0.17 | |
Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7283 is rated as a moderate severity vulnerability that could lead to unauthorized file overwrites.
To fix CVE-2019-7283, ensure that you update to the latest version of NetKit beyond 0.17 where this vulnerability has been addressed.
CVE-2019-7283 affects versions of NetKit up to 0.17 and Debian GNU/Linux version 9.0.
CVE-2019-7283 allows an attacker to exploit the vulnerability through a malicious rsh server to overwrite files on the client side.
Yes, CVE-2019-7283 can be exploited by a Man-in-The-Middle attacker to manipulate files during an rcp operation.