DescriptionAn issue was discovered in rcp in NetKit through 0.17. For an rcp operation, the server chooses which files/directories are sent to the client. However, the rcp client only performs cursory validation of the object name returned. A malicious rsh server (or Man-in-The-Middle attacker) can overwrite arbitrary files in a directory on the rcp client machine. This is similar to CVE-2019-6111.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs920486

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
netkit-rsh (PTS)stretch0.17-17vulnerable
bullseye, sid0.17-22fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[stretch] - netkit-rsh <no-dsa> (Minor issue)
[jessie] - netkit-rsh <no-dsa> (Minor issue)

Search for package or bug name: Reporting problems