It was discovered that rssh incorrectly handled certain command-line arguments and environment variables. An authenticated user could bypass rssh's command restrictions, allowing an attacker to run arbitrary commands.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.3.4-4+deb8u2ubuntu0.14.04.2", "binary_name": "rssh" }, { "binary_version": "2.3.4-4+deb8u2ubuntu0.14.04.2", "binary_name": "rssh-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.3.4-4+deb8u2ubuntu0.16.04.2", "binary_name": "rssh" }, { "binary_version": "2.3.4-4+deb8u2ubuntu0.16.04.2", "binary_name": "rssh-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.3.4-7ubuntu0.1", "binary_name": "rssh" }, { "binary_version": "2.3.4-7ubuntu0.1", "binary_name": "rssh-dbgsym" } ] }