| VID |
23086 |
| Severity |
40 |
| Port |
873 |
| Protocol |
TCP |
| Class |
RSYNCD |
| Detailed Description |
The rsync server, according to its version number, is vulnerable to a directory traversal flaw. Included in most distributions of Linux, rsync is a popular tool for synchronizing files across multiple hosts. Though not enabled in the default configuration, rsync can be run as a daemon to facilitate the distribution of files to FTP mirror sites. Directory traversal vulnerability in the sanitize_path function in util.c for rsync 2.6.2 and earlier, when chroot is disabled, allows a remote attacker to view or write files on the vulnerable system with privileges of rsync.
* Note: This check solely relied on the version number of the remote rsync server to assess this vulnerability, so this might be a false positive.
* References: http://www.ciac.org/ciac/bulletins/o-198.shtml http://www.securitytracker.com/alerts/2004/Aug/1010940.html
* Platforms Affected: GNU Project, rsync prior to 2.6.3 UNIX Any version Linux Any version |
| Recommendation |
Upgrade to the latest version of rsync (2.6.3 or later), when it becomes available from the rsync download Web page at http://samba.org/rsync/download.html
For Red Hat Linux: Upgrade to the latest rsync package, as listed in Red Hat Security Advisory RHSA-2004:436-07 at https://rhn.redhat.com/errata/RHSA-2004-436.html
For SuSE Linux: Upgrade to the latest rsync package, as listed in SuSE Security Announcement SuSE-SUSE-SA:2004:026 at http://www.suse.de/de/security/2004_26_rsync.html
For Debian GNU/Linux 3.0 (alias woody): Upgrade to the latest rsync package (2.5.5-0.6 or later), as listed in Debian Security Advisory DSA-538-1 at http://www.debian.org/security/2004/dsa-538
For Trustix Secure Linux: Upgrade to the latest rsync package, as listed in Trustix Secure Linux Security Advisory #2004-0042 at http://www.trustix.net/errata/2004/0042/
For Gentoo Linux: Upgrade to the latest version of rsync (2.6.0-r3 or later), as listed in Gentoo Linux Security Advisory GLSA 200408-17 at http://www.gentoo.org/security/en/glsa/glsa-200408-17.xml
For Mandrake Linux: Upgrade to the latest rsync package, as listed in MandrakeSoft Security Advisory MDKSA-2004:083 at http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:083
For OpenPKG: Upgrade to the latest rsync package, as listed in OpenPKG Security Advisory OpenPKG-SA-2004.037 at http://www.openpkg.org/security/OpenPKG-SA-2004.037-rsync.html
For other distributions: Contact your vendor for upgrade or patch information. |
| Related URL |
CVE-2004-0792 (CVE) |
| Related URL |
10938 (SecurityFocus) |
| Related URL |
16975 (ISS) |
|