CVE-2004-1161 – RSSH 2.x - Arbitrary Command Execution
https://notcve.org/view.php?id=CVE-2004-1161
rssh 2.2.2 and earlier does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via (1) rdist -P, (2) rsync, or (3) scp -S. • https://www.exploit-db.com/exploits/24795 http://marc.info/?l=bugtraq&m=110202047507273&w=2 http://marc.info/?l=bugtraq&m=110581113814623&w=2 http://www.gentoo.org/security/en/glsa/glsa-200412-01.xml http://www.securityfocus.com/bid/11792 •
CVE-2004-1628
https://notcve.org/view.php?id=CVE-2004-1628
Format string vulnerability in log.c in rssh before 2.2.2 allows remote authenticated users to execute arbitrary code. • http://marc.info/?l=bugtraq&m=109855982425122&w=2 http://secunia.com/advisories/12954 http://www.gentoo.org/security/en/glsa/glsa-200410-28.xml http://www.pizzashack.org/rssh https://exchange.xforce.ibmcloud.com/vulnerabilities/17831 • CWE-134: Use of Externally-Controlled Format String •
CVE-2004-0609
https://notcve.org/view.php?id=CVE-2004-0609
rssh 2.0 through 2.1.x expands command line arguments before entering a chroot jail, which allows remote authenticated users to determine the existence of files in a directory outside the jail. rssh 2.0 a 2.1.x expanden argumentos de línea de comandos antes de entrar en una jaula chroot, lo que permite a usuarios remotos autenticaos determinar la existencia de de ficheros en un directorio fuera de la jaula. • http://marc.info/?l=bugtraq&m=108787373022844&w=2 http://www.securityfocus.com/bid/10574 https://exchange.xforce.ibmcloud.com/vulnerabilities/16470 •