It was discovered that rssh incorrectly handled certain command-line arguments and environment variables. An authenticated user could bypass rssh's command restrictions, allowing an attacker to run arbitrary commands.
{ "binaries": [ { "binary_version": "2.3.4-4+deb8u2ubuntu0.14.04.2", "binary_name": "rssh" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "2.3.4-4+deb8u2ubuntu0.16.04.2", "binary_name": "rssh" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "2.3.4-7ubuntu0.1", "binary_name": "rssh" } ], "availability": "No subscription required" }