6 results (0.025 seconds)

CVSS: 4.4EPSS: 0%CPEs: 14EXPL: 0

Incomplete blacklist vulnerability in rssh before 2.3.4, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via the --rsh command line option. Vulnerabilidad de lista negra incompleta en rssh antes de v2.3.4, cuando el protocolo rsync está activado, permite a los usuarios locales eludir las restricciones de acceso a la interfaz de comandos a través de la opción --rsh de la línea de comandos. • http://archives.neohapsis.com/archives/bugtraq/2012-11/0101.html http://osvdb.org/87926 http://secunia.com/advisories/51307 http://secunia.com/advisories/51343 http://www.debian.org/security/2012/dsa-2578 http://www.openwall.com/lists/oss-security/2012/11/27/15 http://www.openwall.com/lists/oss-security/2012/11/28/2 http://www.openwall.com/lists/oss-security/2012/11/28/3 http://www.securityfocus.com/bid/56708 https://bugzilla.redhat.com/show_bug.cgi?i •

CVSS: 2.1EPSS: 0%CPEs: 13EXPL: 0

rssh 2.3.3 and earlier allows local users to bypass intended restricted shell access via crafted environment variables in the command line. rssh v2.3.3 y anteriores permite evitar las restricciones de acceso a objetos shell a usuarios locales a través de variables de entorno modificadas en la línea de comandos. • http://archives.neohapsis.com/archives/bugtraq/2012-05/0036.html http://archives.neohapsis.com/archives/bugtraq/2012-11/0101.html http://secunia.com/advisories/50272 http://sourceforge.net/mailarchive/message.php?msg_id=29235647 http://www.debian.org/security/2012/dsa-2530 http://www.openwall.com/lists/oss-security/2012/08/10/7 http://www.openwall.com/lists/oss-security/2012/08/11/3 http://www.openwall.com/lists/oss-security/2012/11/28/3 http://www.securityfocus • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

rssh 2.0.0 through 2.2.3 allows local users to bypass access restrictions and gain root privileges by using the rssh_chroot_helper command to chroot to an external directory. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=344424 http://secunia.com/advisories/18224 http://secunia.com/advisories/18237 http://securityreason.com/securityalert/308 http://www.gentoo.org/security/en/glsa/glsa-200512-15.xml http://www.pizzashack.org/rssh/security.shtml http://www.securityfocus.com/bid/16050 https://exchange.xforce.ibmcloud.com/vulnerabilities/23854 •

CVSS: 7.5EPSS: 2%CPEs: 6EXPL: 2

rssh 2.2.2 and earlier does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via (1) rdist -P, (2) rsync, or (3) scp -S. • https://www.exploit-db.com/exploits/24795 http://marc.info/?l=bugtraq&m=110202047507273&w=2 http://marc.info/?l=bugtraq&m=110581113814623&w=2 http://www.gentoo.org/security/en/glsa/glsa-200412-01.xml http://www.securityfocus.com/bid/11792 •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

Format string vulnerability in log.c in rssh before 2.2.2 allows remote authenticated users to execute arbitrary code. • http://marc.info/?l=bugtraq&m=109855982425122&w=2 http://secunia.com/advisories/12954 http://www.gentoo.org/security/en/glsa/glsa-200410-28.xml http://www.pizzashack.org/rssh https://exchange.xforce.ibmcloud.com/vulnerabilities/17831 • CWE-134: Use of Externally-Controlled Format String •