CVE-2012-3478
Published Aug 31, 2012
Last updated 12 years ago
Overview
- Description
- rssh 2.3.3 and earlier allows local users to bypass intended restricted shell access via crafted environment variables in the command line.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:pizzashack:rssh:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6F4A975-E5EE-42E5-A3DD-5ED7D736D3FD", "versionEndIncluding": "2.3.2" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "405D117C-7A65-48DD-B898-4E7526A47392" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02796C4B-F155-4D6B-9692-0C467B259B3D" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D3BE629-9E24-4E48-9ADD-61174BBAD270" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "147D0EA0-3F3E-488E-A5FF-618614B34D9C" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "994DDFAC-D9D6-4146-8628-5014E52A6847" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA58CBF8-1826-44D7-B2F0-999B8DA61F1F" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D984CE9-5283-4DAE-9D42-9B5AE31A4002" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D718FA8D-2699-4150-AB39-357E1585EB46" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "255C9863-4D7E-46CE-A1C9-F897EFB85D38" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72CB8450-D58D-4824-931F-2D61451F2C5C" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C75A3EB-ABDF-458B-8B49-505791EF8749" }, { "criteria": "cpe:2.3:a:pizzashack:rssh:2.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6BACEEB-9CBD-4E94-A3EF-61E220F2D68E" } ], "operator": "OR" } ] } ]