Insufficient sanitization of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 04:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2021/May/78 - Mailing List, Not Applicable, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/106839 - Third Party Advisory, VDB Entry | |
References | () https://lists.debian.org/debian-lts-announce/2019/02/msg00007.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HO3MDU3AH5SLYBKHH5PJ6PHC63ASIF42/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KR2OHTHMJVV4DO3HDRFQQZ5JENHDJQEN/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T42YYNWJZG422GATWAHAEK4A24OKY557/ - | |
References | () https://security.gentoo.org/glsa/202007-29 - Third Party Advisory | |
References | () https://tracker.debian.org/news/1026713/accepted-rssh-234-5deb9u2-source-amd64-into-stable-embargoed-stable/ - Mailing List, Third Party Advisory | |
References | () https://usn.ubuntu.com/3946-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2019/dsa-4382 - Third Party Advisory |
28 May 2021, 19:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* |
|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KR2OHTHMJVV4DO3HDRFQQZ5JENHDJQEN/ - Mailing List, Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/3946-1/ - Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/202007-29 - Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T42YYNWJZG422GATWAHAEK4A24OKY557/ - Mailing List, Third Party Advisory | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2021/May/78 - Mailing List, Not Applicable, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3MDU3AH5SLYBKHH5PJ6PHC63ASIF42/ - Mailing List, Third Party Advisory |
27 May 2021, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2019-02-06 19:29
Updated : 2024-11-21 04:42
NVD link : CVE-2019-3464
Mitre link : CVE-2019-3464
CVE.ORG link : CVE-2019-3464
JSON object : View
Products Affected
pizzashack
- rssh
fedoraproject
- fedora
canonical
- ubuntu_linux
debian
- debian_linux
CWE
CWE-665
Improper Initialization