FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

rssh -- configuration restrictions bypass

Affected packages
rssh < 2.3.3

Details

VuXML ID a4598875-ec91-11e1-8bd8-0022156e8794
Discovery 2010-08-01
Entry 2012-08-22

Derek Martin (rssh maintainer) reports:

John Barber reported a problem where, if the system administrator misconfigures rssh by providing too few access bits in the configuration file, the user will be given default permissions (scp) to the entire system, potentially circumventing any configured chroot. Fixing this required a behavior change: in the past, using rssh without a config file would give all users default access to use scp on an unchrooted system. In order to correct the reported bug, this feature has been eliminated, and you must now have a valid configuration file. If no config file exists, all users will be locked out.

References

URL http://www.pizzashack.org/rssh/security.shtml