Name | CVE-2004-2687 |
Description | distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
distcc (PTS) | jessie | 3.1-6.1 | fixed |
| stretch | 3.1-6.2 | fixed |
| buster | 3.3.2-10+deb10u1 | fixed |
| bullseye | 3.4+really3.3.5-3 | fixed |
| bookworm | 3.4+really3.4-3 | fixed |
| sid, trixie | 3.4+really3.4-9 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
distcc | source | (unstable) | 2.18.1-1 | low | | |
Notes
since 2.18.1-1 there is the --allow switch to control network access
https://github.com/distcc/distcc/issues/155
Fix in depth is only in later version 3.3, cf.
https://bugs.debian.org/892973