During our security testing of the fixes, we found another attack vector for 
the issue similar to the one mentioned in 
CVE-2022-37704<https://github.com/MaherAzzouzi/CVE-2022-37704>.

Dump can be manipulated by an attacker through the RSH environment variable, 
which is used to specify the shell binary to be used for remote backups.

By manipulating this variable and invoking Dump via rundump, an attacker can 
execute arbitrary code with root privileges.

We now filter out RSH environment variable to prevent this exploit.

The fix for this issue is available at - 
https://github.com/zmanda/amanda/pull/202.

Is there anything else we can help you with to avert the March 2nd auto removal?

We also recommend pointing to the github repository 
(https://github.com/zmanda/amanda.git) instead of pointing to svn as future 
development will continue on github and we would like to phase out svn.

Best Regards,

AmandaTrusted

From: Amanda Trusted <amanda.trus...@zmanda.com>
Date: Wednesday, February 15, 2023 at 5:10 PM
To: 1029...@bugs.debian.org <1029...@bugs.debian.org>
Cc: j...@calhariz.com <j...@calhariz.com>
Subject: Re: Bug#1029829: amanda: CVE-2022-37704 CVE-2022-37705
Hi Jose,

Here are the relevant bug fixes -
[0] CVE - https://security-tracker.debian.org/tracker/CVE-2022-37704 
https://www.cve.org/CVERecord?id=CVE-2022-37704
Fix - https://github.com/zmanda/amanda/pull/197

[1] CVE - https://security-tracker.debian.org/tracker/CVE-2022-37705 
https://www.cve.org/CVERecord?id=CVE-2022-37705
Fix - https://github.com/zmanda/amanda/pull/196


[2] CVE - https://security-tracker.debian.org/tracker/CVE-2022-37703 
https://www.cve.org/CVERecord?id=CVE-2022-37703
Fix - https://github.com/zmanda/amanda/pull/198

These 3 fixes are due for release as part of Amanda 3.5.3 within a week.

Let us know if there are any other action items for us.

Regards,

AmandaTrusted

Confidentiality Notice | The information transmitted by this email is intended 
only for the person or entity to which it is addressed. This email may contain 
proprietary, business-confidential and/or privileged material. If you are not 
the intended recipient of this message, be aware that any use, review, 
re-transmission, distribution, reproduction or any action taken in reliance 
upon this message is strictly prohibited. If you received this in error, please 
contact the sender and delete the material from all computers.

Reply via email to