SB2014093023 - Fedora EPEL 5 update for rssh
Published: September 30, 2014 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2012-3478)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
rssh 2.3.3 and earlier allows local users to bypass intended restricted shell access via crafted environment variables in the command line.
2) Input validation error (CVE-ID: CVE-2012-2251)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
rssh 2.3.2, as used by Debian, Fedora, and others, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via a (1) "-e" or (2) "--" command line option.
3) Input validation error (CVE-ID: CVE-2012-2252)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Incomplete blacklist vulnerability in rssh before 2.3.4, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via the --rsh command line option. Per: http://cwe.mitre.org/data/definitions/184.html 'CWE-184: Incomplete Blacklist'
Remediation
Install update from vendor's website.