It was discovered that rssh incorrectly handled certain command-line arguments and environment variables. An authenticated user could bypass rssh's command restrictions, allowing an attacker to run arbitrary commands.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "rssh", "binary_version": "2.3.4-4+deb8u2ubuntu0.14.04.2" }, { "binary_name": "rssh-dbgsym", "binary_version": "2.3.4-4+deb8u2ubuntu0.14.04.2" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "rssh", "binary_version": "2.3.4-4+deb8u2ubuntu0.16.04.2" }, { "binary_name": "rssh-dbgsym", "binary_version": "2.3.4-4+deb8u2ubuntu0.16.04.2" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "rssh", "binary_version": "2.3.4-7ubuntu0.1" }, { "binary_name": "rssh-dbgsym", "binary_version": "2.3.4-7ubuntu0.1" } ] }