CVE-2007-6415
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
25/01/2008
Last modified:
09/04/2025
Description
scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute arbitrary code by invoking scp, as implemented by OpenSSH, with the -F and -o options.
Impact
Base Score 2.0
8.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148
- http://bugs.gentoo.org/show_bug.cgi?id=203099
- http://secunia.com/advisories/28538
- http://secunia.com/advisories/28944
- http://secunia.com/advisories/28981
- http://security.gentoo.org/glsa/glsa-200802-06.xml
- http://www.debian.org/security/2008/dsa-1473
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00546.html
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437148
- http://bugs.gentoo.org/show_bug.cgi?id=203099
- http://secunia.com/advisories/28538
- http://secunia.com/advisories/28944
- http://secunia.com/advisories/28981
- http://security.gentoo.org/glsa/glsa-200802-06.xml
- http://www.debian.org/security/2008/dsa-1473
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00546.html
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00595.html



