3 results (0.002 seconds)

CVSS: 9.8EPSS: 0%CPEs: 14EXPL: 0

28 Nov 2012 — Incomplete blacklist vulnerability in rssh before 2.3.4, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via the --rsh command line option. Vulnerabilidad de lista negra incompleta en rssh antes de v2.3.4, cuando el protocolo rsync está activado, permite a los usuarios locales eludir las restricciones de acceso a la interfaz de comandos a través de la opción --rsh de la línea de comandos. James Clawson discovered that rssh, a restricted shell for OpenSSH to ... • http://archives.neohapsis.com/archives/bugtraq/2012-11/0101.html •

CVSS: 9.1EPSS: 0%CPEs: 13EXPL: 0

15 Aug 2012 — rssh 2.3.3 and earlier allows local users to bypass intended restricted shell access via crafted environment variables in the command line. rssh v2.3.3 y anteriores permite evitar las restricciones de acceso a objetos shell a usuarios locales a través de variables de entorno modificadas en la línea de comandos. RSSH version 2.3.4 was released to address an environment variable manipulation vulnerability and an improper filtering of the rsync command line. • http://archives.neohapsis.com/archives/bugtraq/2012-05/0036.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

20 Mar 2006 — util.c in rssh 2.3.0 in Debian GNU/Linux does not use braces to make a block, which causes a check for CVS to always succeed and allows rsync and rdist to bypass intended access restrictions in rssh.conf. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346322 •