lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120508172452.GF1780@dragontoe.org>
Date: Tue, 8 May 2012 12:24:52 -0500
From: Derek Martin <code@...zashack.org>
To: bugtraq@...urityfocus.com
Cc: rssh-discuss@...rceforge.net
Subject: rssh security announcement

rssh is a shell for restricting SSH access to a machine to only scp,
sftp, or a small set of similar applications.  

  http://www.pizzashack.org/rssh/

Henrik Erkkonen has discovered that, through clever manipulation of
environment variables on the ssh command line, it is possible to
circumvent rssh.  As far as I can tell, there is no way to effect a
root compromise, except of course if the root account is the one
you're attempting to protect with rssh...

This project is old, and I have no interest in continuing to maintain
it.  I looked for easy solutions to the problem, but in discussing
them with Henrik, none which we found satisfactorily address the
problem.  Fixing this properly will require more work than I want to
put into it.

Note in particular that ensuring that the AcceptEnv sshd configuration
option need not be turned on for this exploit to work.

-- 
Derek D. Martin
http://www.pizzashack.org/
GPG Key ID: 0x81CFE75D


Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ