Executive Summary
Summary | |
---|---|
Title | New rsync packages fix unauthorised directory traversal and file access |
Informations | |||
---|---|---|---|
Name | DSA-538 | First vendor Publication | 2004-08-17 |
Vendor | Debian | Last vendor Modification | 2004-08-17 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 6.4 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The rsync developers have discoverd a security related problem in rsync, a fast remote file copy program, which offers an attacker to access files outside of the defined directory. To exploit this path-sanitizing bug, rsync has to run in daemon mode with the chroot option being disabled. It does not affect the normal send/receive filenames that specify what files should be transferred. It does affect certain option paths that cause auxilliary files to be read or written. For the stable distribution (woody) this problem has been fixed in version 2.5.5-0.6. For the unstable distribution (sid) this problem has been fixed in version 2.6.2-3. We recommend that you upgrade your rsync package. |
Original Source
Url : http://www.debian.org/security/2004/dsa-538 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10561 | |||
Oval ID: | oval:org.mitre.oval:def:10561 | ||
Title: | Directory traversal vulnerability in the sanitize_path function in util.c for rsync 2.6.2 and earlier, when chroot is disabled, allows attackers to read or write certain files. | ||
Description: | Directory traversal vulnerability in the sanitize_path function in util.c for rsync 2.6.2 and earlier, when chroot is disabled, allows attackers to read or write certain files. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0792 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200408-17 (rsync) File : nvt/glsa_200408_17.nasl |
2008-09-04 | Name : FreeBSD Ports: rsync File : nvt/freebsd_rsync.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 538-1 (rsync) File : nvt/deb_538_1.nasl |
2005-11-03 | Name : rsync path sanitation vulnerability File : nvt/rsync_path_sanitation_vuln.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
8829 | rsync sanitize_path() Arbitrary File Dislcosure rsync contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when an attacker supplies a specially crafted path which causes the sanitize_path()function to generate an absolute filename in place of a relative filename, which will disclose arbitrary file information resulting in a loss of confidentiality. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-07-13 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2004-285-01.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_2689f4cbec4c11d89440000347a4fa7d.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-538.nasl - Type : ACT_GATHER_INFO |
2004-09-01 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2004-436.nasl - Type : ACT_GATHER_INFO |
2004-08-30 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200408-17.nasl - Type : ACT_GATHER_INFO |
2004-08-22 | Name : The remote Mandrake Linux host is missing a security update. File : mandrake_MDKSA-2004-083.nasl - Type : ACT_GATHER_INFO |
2004-08-16 | Name : Arbitrary files can be accessed from the remote host. File : rsync_path_sanitation_vuln.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:33:24 |
|