Format string vulnerability in log.c in rssh before 2.2.2 allows remote authenticated users to execute arbitrary code.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
http://www.pizzashack.org/rssh/ | vendor advisory |
http://www.gentoo.org/security/en/glsa/glsa-200410-28.xml | third party advisory vendor advisory |
http://marc.info/?l=bugtraq&m=109855982425122&w=2 | third party advisory mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17831 | vdb entry |
http://secunia.com/advisories/12954 | third party advisory |