SB2013011102 - Multiple vulnerabilities in rssh.sourceforge.net rssh
Published: January 11, 2013 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2012-2251)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
rssh 2.3.2, as used by Debian, Fedora, and others, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via a (1) "-e" or (2) "--" command line option.
2) Input validation error (CVE-ID: CVE-2012-2252)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Incomplete blacklist vulnerability in rssh before 2.3.4, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via the --rsh command line option. Per: http://cwe.mitre.org/data/definitions/184.html 'CWE-184: Incomplete Blacklist'
Remediation
Install update from vendor's website.
References
- http://archives.neohapsis.com/archives/bugtraq/2012-11/0101.html
- http://secunia.com/advisories/51307
- http://www.debian.org/security/2012/dsa-2578
- http://www.openwall.com/lists/oss-security/2012/11/27/15
- http://www.securityfocus.com/bid/56708
- https://bugzilla.redhat.com/show_bug.cgi?id=877279
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80334
- http://osvdb.org/87926
- http://secunia.com/advisories/51343
- http://www.openwall.com/lists/oss-security/2012/11/28/2
- http://www.openwall.com/lists/oss-security/2012/11/28/3
- https://bugzilla.redhat.com/show_bug.cgi?id=880177
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80335