Description
Insufficient sanitization of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1660-1 | rssh security update |
Debian DSA |
DSA-4382-1 | rssh security update |
EUVD |
EUVD-2019-13103 | Insufficient sanitization of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands. |
Ubuntu USN |
USN-3946-1 | rssh vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-09-17T04:29:35.125Z
Reserved: 2018-12-31T00:00:00.000Z
Link: CVE-2019-3464
No data.
Status : Modified
Published: 2019-02-06T19:29:00.397
Modified: 2024-11-21T04:42:05.923
Link: CVE-2019-3464
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN