Vulnerability identifier: #VU43211
Vulnerability risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2012-2252
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
rssh
Server applications /
Remote management servers, RDP, SSH
Vendor: rssh.sourceforge.net
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Incomplete blacklist vulnerability in rssh before 2.3.4, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via the --rsh command line option. Per: http://cwe.mitre.org/data/definitions/184.html 'CWE-184: Incomplete Blacklist'
Mitigation
Install update from vendor's website.
Vulnerable software versions
rssh: 2.0.0 - 2.3.2
External links
https://archives.neohapsis.com/archives/bugtraq/2012-11/0101.html
https://osvdb.org/87926
https://secunia.com/advisories/51307
https://secunia.com/advisories/51343
https://www.debian.org/security/2012/dsa-2578
https://www.openwall.com/lists/oss-security/2012/11/27/15
https://www.openwall.com/lists/oss-security/2012/11/28/2
https://www.openwall.com/lists/oss-security/2012/11/28/3
https://www.securityfocus.com/bid/56708
https://bugzilla.redhat.com/show_bug.cgi?id=880177
https://exchange.xforce.ibmcloud.com/vulnerabilities/80335
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.