ALT-PU-2016-1710-1
Closed vulnerabilities
                                                                                    Published: 2013-01-11
                                                                                    
                                                                                
                                                                            BDU:2015-02798
Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
                                                                                        
                                                                                        
                                                                                            Severity: MEDIUM (4.4)
                                                                                        
                                                                                        
                                                                                        
                                                                                        
                                                                                            Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
                                                                                        
                                                                                        
                                                                                    
                                                                                References:
                                                                        
                                                                        
                                                                    
                                                                                    Published: 2013-11-28
                                                                                    
                                                                                
                                                                            BDU:2015-09711
Уязвимости операционной системы Gentoo Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
                                                                                        
                                                                                        
                                                                                            Severity: MEDIUM (4.4)
                                                                                        
                                                                                        
                                                                                        
                                                                                        
                                                                                            Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
                                                                                        
                                                                                        
                                                                                    
                                                                                References:
                                                                        
                                                                        
                                                                    
                                                                                    Published: 2013-01-11
Modified: 2025-04-11
                                                                            Modified: 2025-04-11
CVE-2012-2252
Incomplete blacklist vulnerability in rssh before 2.3.4, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via the --rsh command line option.
                                                                                        
                                                                                        
                                                                                            Severity: MEDIUM (4.4)
                                                                                        
                                                                                        
                                                                                        
                                                                                        
                                                                                            Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
                                                                                        
                                                                                        
                                                                                    
                                                                                References:
                                                                        - http://archives.neohapsis.com/archives/bugtraq/2012-11/0101.html
- http://osvdb.org/87926
- http://secunia.com/advisories/51307
- http://secunia.com/advisories/51343
- http://www.debian.org/security/2012/dsa-2578
- http://www.openwall.com/lists/oss-security/2012/11/27/15
- http://www.openwall.com/lists/oss-security/2012/11/28/2
- http://www.openwall.com/lists/oss-security/2012/11/28/3
- http://www.securityfocus.com/bid/56708
- https://bugzilla.redhat.com/show_bug.cgi?id=880177
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80335
- http://archives.neohapsis.com/archives/bugtraq/2012-11/0101.html
- http://osvdb.org/87926
- http://secunia.com/advisories/51307
- http://secunia.com/advisories/51343
- http://www.debian.org/security/2012/dsa-2578
- http://www.openwall.com/lists/oss-security/2012/11/27/15
- http://www.openwall.com/lists/oss-security/2012/11/28/2
- http://www.openwall.com/lists/oss-security/2012/11/28/3
- http://www.securityfocus.com/bid/56708
- https://bugzilla.redhat.com/show_bug.cgi?id=880177
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80335
                                                                                    Published: 2012-08-31
Modified: 2025-04-11
                                                                            Modified: 2025-04-11
CVE-2012-3478
rssh 2.3.3 and earlier allows local users to bypass intended restricted shell access via crafted environment variables in the command line.
                                                                                        
                                                                                        
                                                                                            Severity: LOW (2.1)
                                                                                        
                                                                                        
                                                                                        
                                                                                        
                                                                                            Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
                                                                                        
                                                                                        
                                                                                    
                                                                                References:
                                                                        - http://archives.neohapsis.com/archives/bugtraq/2012-05/0036.html
- http://archives.neohapsis.com/archives/bugtraq/2012-11/0101.html
- http://secunia.com/advisories/50272
- http://sourceforge.net/mailarchive/message.php?msg_id=29235647
- http://www.debian.org/security/2012/dsa-2530
- http://www.openwall.com/lists/oss-security/2012/08/10/7
- http://www.openwall.com/lists/oss-security/2012/08/11/3
- http://www.openwall.com/lists/oss-security/2012/11/28/3
- http://www.securityfocus.com/bid/53430
- http://archives.neohapsis.com/archives/bugtraq/2012-05/0036.html
- http://archives.neohapsis.com/archives/bugtraq/2012-11/0101.html
- http://secunia.com/advisories/50272
- http://sourceforge.net/mailarchive/message.php?msg_id=29235647
- http://www.debian.org/security/2012/dsa-2530
- http://www.openwall.com/lists/oss-security/2012/08/10/7
- http://www.openwall.com/lists/oss-security/2012/08/11/3
- http://www.openwall.com/lists/oss-security/2012/11/28/3
- http://www.securityfocus.com/bid/53430
