Vulnerability Description
util.c in rssh 2.3.0 in Debian GNU/Linux does not use braces to make a block, which causes a check for CVS to always succeed and allows rsync and rdist to bypass intended access restrictions in rssh.conf.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rssh | Rssh | 2.3.0 |
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346322Patch
- http://secunia.com/advisories/21087
- http://www.debian.org/security/2006/dsa-1109
- http://www.securityfocus.com/bid/18999
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25424
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346322Patch
- http://secunia.com/advisories/21087
- http://www.debian.org/security/2006/dsa-1109
- http://www.securityfocus.com/bid/18999
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25424
FAQ
What is CVE-2006-1320?
CVE-2006-1320 is a vulnerability with a CVSS score of 7.5 (HIGH). util.c in rssh 2.3.0 in Debian GNU/Linux does not use braces to make a block, which causes a check for CVS to always succeed and allows rsync and rdist to bypass intended access restrictions in rssh.c...
How severe is CVE-2006-1320?
CVE-2006-1320 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1320?
Check the references section above for vendor advisories and patch information. Affected products include: Rssh Rssh.