Q-142: openssh Security Update


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Q-142: openssh Security Update
# 1  
Old 12-24-2007
Q-142: openssh Security Update

An arbitrary command execution flaw was discovered in the way scp copies files locally. The risk is LOW. A local attacker could execute arbitrary commands.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

1 More Discussions You Might Find Interesting

1. AIX

OpenSSH update in AIX

Hi, We have 4 vulnerabilities in our AIX servers and the files to be installed are as follows: File to be installed OpenSSH_6.0.0.6102 OpenSSH_6.0.0.6107 OpenSSH_6.0.0.6110 Openssh_fix8 My question is, can we install the Openss_fix8 directly to resolve all the issues or should we... (2 Replies)
Discussion started by: gshari.89
2 Replies
Login or Register to Ask a Question
ESCAPESHELLCMD(3)							 1							 ESCAPESHELLCMD(3)

escapeshellcmd - Escape shell metacharacters

SYNOPSIS
string escapeshellcmd (string $command) DESCRIPTION
escapeshellcmd(3) escapes any characters in a string that might be used to trick a shell command into executing arbitrary commands. This function should be used to make sure that any data coming from user input is escaped before this data is passed to the exec(3) or system(3) functions, or to the backtick operator. Following characters are preceded by a backslash: #&;`|*?~<>^()[]{}$, x0A and xFF. ' and " are escaped only if they are not paired. In Windows, all these characters plus % are replaced by a space instead. PARAMETERS
o $command - The command that will be escaped. RETURN VALUES
The escaped string. EXAMPLES
Example #1 escapeshellcmd(3) example <?php // We allow arbitrary number of arguments intentionally here. $command = './configure '.$_POST['configure_options']; $escaped_command = escapeshellcmd($command); system($escaped_command); ?> Warning escapeshellcmd(3) should be used on the whole command string, and it still allows the attacker to pass arbitrary number of argu- ments. For escaping a single argument escapeshellarg(3) should be used instead. SEE ALSO
escapeshellarg(3), exec(3), popen(3), system(3), backtick operator. PHP Documentation Group ESCAPESHELLCMD(3)