Executive Summary
Summary | |
---|---|
Title | New rsync packages fix directory traversal bug |
Informations | |||
---|---|---|---|
Name | DSA-499 | First vendor Publication | 2004-06-02 |
Vendor | Debian | Last vendor Modification | 2004-06-02 |
Severity (Vendor) | N/A | Revision | 2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability was discovered in rsync, a file transfer program, whereby a remote user could cause an rsync daemon to write files outside of the intended directory tree. This vulnerability is not exploitable when the daemon is configured with the 'chroot' option. This update includes an additional fix related to the original vulnerability. For the current stable distribution (woody) this problem has been fixed in version 2.5.5-0.5. For the unstable distribution (sid), this problem has been fixed in version 2.6.1-1. We recommend that you update your rsync package. |
Original Source
Url : http://www.debian.org/security/2004/dsa-499 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:9495 | |||
Oval ID: | oval:org.mitre.oval:def:9495 | ||
Title: | rsync before 2.6.1 does not properly sanitize paths when running a read/write daemon without using chroot, which allows remote attackers to write files outside of the module's path. | ||
Description: | rsync before 2.6.1 does not properly sanitize paths when running a read/write daemon without using chroot, which allows remote attackers to write files outside of the module's path. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0426 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:967 | |||
Oval ID: | oval:org.mitre.oval:def:967 | ||
Title: | rsync Path Sanitation Vulnerability | ||
Description: | rsync before 2.6.1 does not properly sanitize paths when running a read/write daemon without using chroot, which allows remote attackers to write files outside of the module's path. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0426 | Version: | 2 |
Platform(s): | Red Hat Enterprise Linux 3 | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200407-10 (rsync) File : nvt/glsa_200407_10.nasl |
2008-09-04 | Name : FreeBSD Ports: rsync File : nvt/freebsd_rsync0.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 499-1 (rsync) File : nvt/deb_499_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 499-2 (rsync) File : nvt/deb_499_2.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2004-124-01 rsync update File : nvt/esoft_slk_ssa_2004_124_01.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
5731 | rsync Traversal Arbitrary File Creation A remote unchecked input exists in rsync. The program fails to check write inputs resulting in file write access outside the intended path. With a specially crafted request, an attacker can write files outside the module path, resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | rsync backup-dir directory traversal attempt RuleID : 2561-community - Revision : 8 - Type : SERVER-OTHER |
2014-01-10 | rsync backup-dir directory traversal attempt RuleID : 2561 - Revision : 8 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-04-23 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_73ea07069c5711d893660020ed76ef5a.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2004-124-01.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-499.nasl - Type : ACT_GATHER_INFO |
2004-09-08 | Name : The remote host is missing a Mac OS X update that fixes a security issue. File : macosx_SecUpd20040907.nasl - Type : ACT_GATHER_INFO |
2004-08-30 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200407-10.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing a security update. File : mandrake_MDKSA-2004-042.nasl - Type : ACT_GATHER_INFO |
2004-07-23 | Name : The remote Fedora Core host is missing a security update. File : fedora_2004-116.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2004-192.nasl - Type : ACT_GATHER_INFO |
2004-05-06 | Name : Arbitrary files may be overwritten on the remote host. File : rsync_path_traversal.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:33:17 |
|