Description
Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1660-1 | rssh security update |
Debian DSA |
DSA-4382-1 | rssh security update |
EUVD |
EUVD-2019-13102 | Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands. |
Ubuntu USN |
USN-3946-1 | rssh vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-09-17T01:31:33.198Z
Reserved: 2018-12-31T00:00:00.000Z
Link: CVE-2019-3463
No data.
Status : Modified
Published: 2019-02-06T19:29:00.350
Modified: 2024-11-21T04:42:05.797
Link: CVE-2019-3463
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN