4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
0.0004 Low
EPSS
Percentile
5.2%
Debian Security Advisory DSA-2578-1 [email protected]
http://www.debian.org/security/ Yves-Alexis Perez
November 28, 2012 http://www.debian.org/security/faq
Package : rssh
Vulnerability : insufficient filtering of rsync command line
Problem type : remote
Debian-specific: no
CVE ID : CVE-2012-2251 CVE-2012-2252
Debian Bug :
James Clawson discovered that rssh, a restricted shell for OpenSSH to be used
with scp/sftp, rdist and cvs, was not correctly filtering command line options.
This could be used to force the execution of a remote script and thus allow
arbitrary command execution. Two CVE were assigned:
CVE-2012-2251
Incorrect filtering of command line when using rsync protocol. It was
for example possible to pass dangerous options after a "β" switch. The rsync
protocol support has been added in a Debian (and Fedora/Red Hat) specific
patch, so this vulnerability doesn't affect upstream.
CVE-2012-2251
Incorrect filtering of the "βrsh" option: the filter preventing usage of the
"βrsh=" option would not prevent passing "βrsh". This vulnerability affects
upstream code.
For the stable distribution (squeeze), this problem has been fixed in
version 2.3.2-13squeeze2.
For the testing distribution (wheezy), this problem has been fixed in
version 2.3.3-6.
For the unstable distribution (sid), this problem has been fixed in
version 2.3.3-6.
We recommend that you upgrade your rssh packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 6 | all | rssh | <Β 2.3.2-13squeeze3 | rssh_2.3.2-13squeeze3_all.deb |