Описание
rssh 2.3.2, as used by Debian, Fedora, and others, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via a (1) "-e" or (2) "--" command line option.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 2.3.4-4 |
esm-apps/xenial | not-affected | 2.3.4-4 |
esm-infra-legacy/trusty | not-affected | 2.3.4-4 |
hardy | ignored | end of life |
lucid | ignored | end of life |
oneiric | ignored | end of life |
precise | ignored | end of life |
precise/esm | DNE | precise was needed |
quantal | ignored | end of life |
raring | ignored | end of life |
Показывать по
EPSS
4.4 Medium
CVSS2
Связанные уязвимости
rssh 2.3.2, as used by Debian, Fedora, and others, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via a (1) "-e" or (2) "--" command line option.
rssh 2.3.2, as used by Debian, Fedora, and others, when the rsync prot ...
rssh 2.3.2, as used by Debian, Fedora, and others, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via a (1) "-e" or (2) "--" command line option.
Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
4.4 Medium
CVSS2