![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.72625 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-2578-1) |
Summary: | The remote host is missing an update for the Debian 'rssh' package(s) announced via the DSA-2578-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'rssh' package(s) announced via the DSA-2578-1 advisory. Vulnerability Insight: James Clawson discovered that rssh, a restricted shell for OpenSSH to be used with scp, sftp, rdist and cvs, was not correctly filtering command line options. This could be used to force the execution of a remote script and thus allow arbitrary command execution. Two CVE were assigned: CVE-2012-2251 Incorrect filtering of command line when using rsync protocol. It was for example possible to pass dangerous options after a -- switch. The rsync protocol support has been added in a Debian (and Fedora/Red Hat) specific patch, so this vulnerability doesn't affect upstream. CVE-2012-2252 Incorrect filtering of the --rsh option: the filter preventing usage of the --rsh= option would not prevent passing --rsh. This vulnerability affects upstream code. For the stable distribution (squeeze), this problem has been fixed in version 2.3.2-13squeeze3. For the testing distribution (wheezy), this problem has been fixed in version 2.3.3-6. For the unstable distribution (sid), this problem has been fixed in version 2.3.3-6. We recommend that you upgrade your rssh packages. Affected Software/OS: 'rssh' package(s) on Debian 6. Solution: Please install the updated package(s). CVSS Score: 4.4 CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-2251 BugTraq ID: 56708 http://www.securityfocus.com/bid/56708 Bugtraq: 20121127 Re: rssh security announcement (Google Search) http://archives.neohapsis.com/archives/bugtraq/2012-11/0101.html Debian Security Information: DSA-2578 (Google Search) http://www.debian.org/security/2012/dsa-2578 http://www.openwall.com/lists/oss-security/2012/11/27/15 http://secunia.com/advisories/51307 XForce ISS Database: rssh-eoption-command-execution(80334) https://exchange.xforce.ibmcloud.com/vulnerabilities/80334 Common Vulnerability Exposure (CVE) ID: CVE-2012-2252 https://bugzilla.redhat.com/show_bug.cgi?id=880177 http://www.openwall.com/lists/oss-security/2012/11/28/3 http://www.openwall.com/lists/oss-security/2012/11/28/2 http://osvdb.org/87926 http://secunia.com/advisories/51343 XForce ISS Database: rssh-command-line-command-exec(80335) https://exchange.xforce.ibmcloud.com/vulnerabilities/80335 |
Copyright | Copyright (C) 2012 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |