FreeBSD : rssh -- configuration restrictions bypass (a4598875-ec91-11e1-8bd8-0022156e8794)

high Nessus Plugin ID 61640

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Derek Martin (rssh maintainer) reports :

John Barber reported a problem where, if the system administrator misconfigures rssh by providing too few access bits in the configuration file, the user will be given default permissions (scp) to the entire system, potentially circumventing any configured chroot.
Fixing this required a behavior change: in the past, using rssh without a config file would give all users default access to use scp on an unchrooted system. In order to correct the reported bug, this feature has been eliminated, and you must now have a valid configuration file. If no config file exists, all users will be locked out.

Solution

Update the affected package.

See Also

http://www.pizzashack.org/rssh/security.shtml

http://www.nessus.org/u?8edd80c6

Plugin Details

Severity: High

ID: 61640

File Name: freebsd_pkg_a4598875ec9111e18bd80022156e8794.nasl

Version: 1.5

Type: local

Published: 8/23/2012

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:rssh, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 8/22/2012

Vulnerability Publication Date: 8/1/2010