~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2007-6350

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
PublicDate: 2007-12-14
2
 
Candidate: CVE-2007-6350
3
 
References:
4
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6350
5
 
Description:
6
 
 scponly 4.6 and earlier allows remote authenticated users to bypass
7
 
 intended restrictions and execute code by invoking dangerous subcommands
8
 
 including (1) unison, (2) rsync, (3) svn, and (4) svnserve, as originally
9
 
 demonstrated by creating a Subversion (SVN) repository with malicious
10
 
 hooks, then using svn to trigger execution of those hooks.
11
 
Ubuntu-Description:
12
 
Notes:
13
 
Bugs:
14
 
 https://bugs.launchpad.net/ubuntu/+source/scponly/+bug/185035
15
 
Priority: medium
16
 
Assigned-to:
17
 
Patches_scponly:
18
 
 vendor: http://www.debian.org/security/2008/dsa-1473
19
 
upstream_scponly: released (4.6-1.1)
20
 
dapper_scponly: released (4.6-1etch1build0.6.06.1)
21
 
edgy_scponly: needed (reached end-of-life)
22
 
feisty_scponly: needed (reached end-of-life)
23
 
gutsy_scponly: released (4.6-1.1)
24
 
hardy_scponly: released (4.6-1.1)
25
 
intrepid_scponly: released (4.6-1.1)
26
 
jaunty_scponly: released (4.6-1.1)
27
 
devel_scponly: released (4.6-1.1)