Lucene search

K
freebsdFreeBSD65B25ACC-E63B-11E1-B81C-001B77D09812
HistoryMay 08, 2012 - 12:00 a.m.

rssh -- arbitrary command execution

2012-05-0800:00:00
vuxml.freebsd.org
8

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

0.0004 Low

EPSS

Percentile

5.2%

Derek Martin (rssh maintainer) reports:

Henrik Erkkonen has discovered that, through clever
manipulation of environment variables on the ssh command
line, it is possible to circumvent rssh. As far as I can
tell, there is no way to effect a root compromise, except of
course if the root account is the one you’re attempting to
protect with rssh…

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchrssh< 2.3.4UNKNOWN

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

0.0004 Low

EPSS

Percentile

5.2%