An issue was discovered in rcp in NetKit through 0.17. For an rcp operation, the server chooses which files/directories are sent to the client. However, the rcp client only performs cursory validation of the object name returned. A malicious rsh server (or Man-in-The-Middle attacker) can overwrite arbitrary files in a directory on the rcp client machine. This is similar to CVE-2019-6111.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Netkit | Netkit | * | 0.17 (including) |
Netkit-rsh | Ubuntu | bionic | * |
Netkit-rsh | Ubuntu | cosmic | * |
Netkit-rsh | Ubuntu | disco | * |
Netkit-rsh | Ubuntu | eoan | * |
Netkit-rsh | Ubuntu | esm-apps/bionic | * |
Netkit-rsh | Ubuntu | esm-apps/xenial | * |
Netkit-rsh | Ubuntu | trusty | * |
Netkit-rsh | Ubuntu | upstream | * |
Netkit-rsh | Ubuntu | xenial | * |