Vulnerability Description
rssh 2.2.2 and earlier does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via (1) rdist -P, (2) rsync, or (3) scp -S.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rssh | Rssh | 2.0 |
| Gentoo | Linux | All versions |
References
- http://marc.info/?l=bugtraq&m=110202047507273&w=2
- http://marc.info/?l=bugtraq&m=110581113814623&w=2
- http://www.gentoo.org/security/en/glsa/glsa-200412-01.xmlPatchVendor Advisory
- http://www.securityfocus.com/bid/11792ExploitVendor Advisory
- http://marc.info/?l=bugtraq&m=110202047507273&w=2
- http://marc.info/?l=bugtraq&m=110581113814623&w=2
- http://www.gentoo.org/security/en/glsa/glsa-200412-01.xmlPatchVendor Advisory
- http://www.securityfocus.com/bid/11792ExploitVendor Advisory
FAQ
What is CVE-2004-1161?
CVE-2004-1161 is a vulnerability with a CVSS score of 7.5 (HIGH). rssh 2.2.2 and earlier does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via (1) r...
How severe is CVE-2004-1161?
CVE-2004-1161 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1161?
Check the references section above for vendor advisories and patch information. Affected products include: Rssh Rssh, Gentoo Linux.