SB2014093023 - Fedora EPEL 5 update for rssh



SB2014093023 - Fedora EPEL 5 update for rssh

Published: September 30, 2014 Updated: April 24, 2025

Security Bulletin ID SB2014093023
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2012-3478)

The vulnerability allows a remote non-authenticated attacker to manipulate data.

rssh 2.3.3 and earlier allows local users to bypass intended restricted shell access via crafted environment variables in the command line.


2) Input validation error (CVE-ID: CVE-2012-2251)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

rssh 2.3.2, as used by Debian, Fedora, and others, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via a (1) "-e" or (2) "--" command line option.


3) Input validation error (CVE-ID: CVE-2012-2252)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Incomplete blacklist vulnerability in rssh before 2.3.4, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via the --rsh command line option. Per: http://cwe.mitre.org/data/definitions/184.html 'CWE-184: Incomplete Blacklist'


Remediation

Install update from vendor's website.