
CVE-2012-2251
https://notcve.org/view.php?id=CVE-2012-2251
11 Jan 2013 — rssh 2.3.2, as used by Debian, Fedora, and others, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via a (1) "-e" or (2) "--" command line option. rssh v2.3.2, tal y como como se usa en Debian, Fedora, y otros, cuando el protocolo rsync está habilitado, permite a los usuarios locales eludir las restricciones de acceso a través de una opción (1) "-e" o (2) "--" de la línea de comandos. • http://archives.neohapsis.com/archives/bugtraq/2012-11/0101.html • CWE-20: Improper Input Validation •

CVE-2012-2252 – Gentoo Linux Security Advisory 201311-19
https://notcve.org/view.php?id=CVE-2012-2252
11 Jan 2013 — Incomplete blacklist vulnerability in rssh before 2.3.4, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via the --rsh command line option. Vulnerabilidad de lista negra incompleta en rssh antes de v2.3.4, cuando el protocolo rsync está activado, permite a los usuarios locales eludir las restricciones de acceso a la interfaz de comandos a través de la opción --rsh de la línea de comandos. Multiple vulnerabilities have been found in rssh, allowing local attac... • http://archives.neohapsis.com/archives/bugtraq/2012-11/0101.html •

CVE-2012-3478 – Gentoo Linux Security Advisory 201311-19
https://notcve.org/view.php?id=CVE-2012-3478
31 Aug 2012 — rssh 2.3.3 and earlier allows local users to bypass intended restricted shell access via crafted environment variables in the command line. rssh v2.3.3 y anteriores permite evitar las restricciones de acceso a objetos shell a usuarios locales a través de variables de entorno modificadas en la línea de comandos. Multiple vulnerabilities have been found in rssh, allowing local attackers to bypass access restrictions. Versions less than 2.3.4 are affected. • http://archives.neohapsis.com/archives/bugtraq/2012-05/0036.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2006-1320
https://notcve.org/view.php?id=CVE-2006-1320
20 Mar 2006 — util.c in rssh 2.3.0 in Debian GNU/Linux does not use braces to make a block, which causes a check for CVS to always succeed and allows rsync and rdist to bypass intended access restrictions in rssh.conf. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346322 •

CVE-2005-3345
https://notcve.org/view.php?id=CVE-2005-3345
28 Dec 2005 — rssh 2.0.0 through 2.2.3 allows local users to bypass access restrictions and gain root privileges by using the rssh_chroot_helper command to chroot to an external directory. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=344424 •

CVE-2004-1161 – RSSH 2.x - Arbitrary Command Execution
https://notcve.org/view.php?id=CVE-2004-1161
10 Dec 2004 — rssh 2.2.2 and earlier does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via (1) rdist -P, (2) rsync, or (3) scp -S. • https://www.exploit-db.com/exploits/24795 •

CVE-2004-1628
https://notcve.org/view.php?id=CVE-2004-1628
23 Oct 2004 — Format string vulnerability in log.c in rssh before 2.2.2 allows remote authenticated users to execute arbitrary code. • http://marc.info/?l=bugtraq&m=109855982425122&w=2 • CWE-134: Use of Externally-Controlled Format String •

CVE-2004-0609
https://notcve.org/view.php?id=CVE-2004-0609
30 Jun 2004 — rssh 2.0 through 2.1.x expands command line arguments before entering a chroot jail, which allows remote authenticated users to determine the existence of files in a directory outside the jail. rssh 2.0 a 2.1.x expanden argumentos de línea de comandos antes de entrar en una jaula chroot, lo que permite a usuarios remotos autenticaos determinar la existencia de de ficheros en un directorio fuera de la jaula. • http://marc.info/?l=bugtraq&m=108787373022844&w=2 •