Korean
<< Back
VID 23086
Severity 40
Port 873
Protocol TCP
Class RSYNCD
Detailed Description The rsync server, according to its version number, is vulnerable to a directory traversal flaw. Included in most distributions of Linux, rsync is a popular tool for synchronizing files across multiple hosts. Though not enabled in the default configuration, rsync can be run as a daemon to facilitate the distribution of files to FTP mirror sites.
Directory traversal vulnerability in the sanitize_path function in util.c for rsync 2.6.2 and earlier, when chroot is disabled, allows a remote attacker to view or write files on the vulnerable system with privileges of rsync.

* Note: This check solely relied on the version number of the remote rsync server to assess this vulnerability, so this might be a false positive.

* References:
http://www.ciac.org/ciac/bulletins/o-198.shtml
http://www.securitytracker.com/alerts/2004/Aug/1010940.html

* Platforms Affected:
GNU Project, rsync prior to 2.6.3
UNIX Any version
Linux Any version
Recommendation Upgrade to the latest version of rsync (2.6.3 or later), when it becomes available from the rsync download Web page at http://samba.org/rsync/download.html

For Red Hat Linux:
Upgrade to the latest rsync package, as listed in Red Hat Security Advisory RHSA-2004:436-07 at https://rhn.redhat.com/errata/RHSA-2004-436.html

For SuSE Linux:
Upgrade to the latest rsync package, as listed in SuSE Security Announcement SuSE-SUSE-SA:2004:026 at http://www.suse.de/de/security/2004_26_rsync.html

For Debian GNU/Linux 3.0 (alias woody):
Upgrade to the latest rsync package (2.5.5-0.6 or later), as listed in Debian Security Advisory DSA-538-1 at http://www.debian.org/security/2004/dsa-538

For Trustix Secure Linux:
Upgrade to the latest rsync package, as listed in Trustix Secure Linux Security Advisory #2004-0042 at http://www.trustix.net/errata/2004/0042/

For Gentoo Linux:
Upgrade to the latest version of rsync (2.6.0-r3 or later), as listed in Gentoo Linux Security Advisory GLSA 200408-17 at http://www.gentoo.org/security/en/glsa/glsa-200408-17.xml

For Mandrake Linux:
Upgrade to the latest rsync package, as listed in MandrakeSoft Security Advisory MDKSA-2004:083 at http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:083

For OpenPKG:
Upgrade to the latest rsync package, as listed in OpenPKG Security Advisory OpenPKG-SA-2004.037 at http://www.openpkg.org/security/OpenPKG-SA-2004.037-rsync.html

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2004-0792 (CVE)
Related URL 10938 (SecurityFocus)
Related URL 16975 (ISS)