First published: Fri Jan 11 2013(Updated: )
rssh 2.3.2, as used by Debian, Fedora, and others, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via a (1) "-e" or (2) "--" command line option.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/rssh | ||
Pizzashack Rssh | =2.3.2 | |
Debian | ||
Fedora |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2251 has a medium severity rating allowing local users to bypass restricted shell access.
To fix CVE-2012-2251, upgrade to a version of rssh that is not affected, specifically above 2.3.2.
CVE-2012-2251 affects users running rssh version 2.3.2 on Debian, Fedora, and similar systems.
The bypass in CVE-2012-2251 occurs when using the "-e" or "--" command line option with enabled rsync protocol.
No, CVE-2012-2251 is a local privilege escalation vulnerability that cannot be exploited remotely.