SB2013011102 - Multiple vulnerabilities in rssh.sourceforge.net rssh



SB2013011102 - Multiple vulnerabilities in rssh.sourceforge.net rssh

Published: January 11, 2013 Updated: August 11, 2020

Security Bulletin ID SB2013011102
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2012-2251)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

rssh 2.3.2, as used by Debian, Fedora, and others, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via a (1) "-e" or (2) "--" command line option.


2) Input validation error (CVE-ID: CVE-2012-2252)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Incomplete blacklist vulnerability in rssh before 2.3.4, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via the --rsh command line option. Per: http://cwe.mitre.org/data/definitions/184.html 'CWE-184: Incomplete Blacklist'


Remediation

Install update from vendor's website.