CVE-2012-2252
Published Jan 11, 2013
Last updated 7 years ago
Overview
- Description
- Incomplete blacklist vulnerability in rssh before 2.3.4, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via the --rsh command line option.
- Source
- security@debian.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.4
- Impact score
- 6.4
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Evaluator
- Comment
- Per: http://cwe.mitre.org/data/definitions/184.html 'CWE-184: Incomplete Blacklist'
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:pizzashack:rssh:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "541B5F5E-B34F-4E0C-99A0-99AF53D7536F", "versionEndIncluding": "2.3.3" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "405D117C-7A65-48DD-B898-4E7526A47392" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02796C4B-F155-4D6B-9692-0C467B259B3D" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D3BE629-9E24-4E48-9ADD-61174BBAD270" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "147D0EA0-3F3E-488E-A5FF-618614B34D9C" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "994DDFAC-D9D6-4146-8628-5014E52A6847" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA58CBF8-1826-44D7-B2F0-999B8DA61F1F" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D984CE9-5283-4DAE-9D42-9B5AE31A4002" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D718FA8D-2699-4150-AB39-357E1585EB46" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "255C9863-4D7E-46CE-A1C9-F897EFB85D38" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72CB8450-D58D-4824-931F-2D61451F2C5C" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C75A3EB-ABDF-458B-8B49-505791EF8749" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6BACEEB-9CBD-4E94-A3EF-61E220F2D68E" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F69D6E8-00A6-417C-A458-F8C4B90CB694" } ], "operator": "OR" } ] } ]