Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50800
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDKSA-2002:024 (rsync)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to rsync
announced via advisory MDKSA-2002:024.

Ethan Benson discovered a bug in rsync where the supplementary groups
that the rsync daemon runs as (such as root) would not be removed
from the server process after changing to the specified unprivileged
uid and gid. This seems only serious if rsync is called using rsync
--daemon from the command line where it will inherit the group of the
user starting the server (usually root). Note that, by default,
Mandrake Linux uses xinetd to handle connections to the rsync daemon.
This was fixed upstream in version 2.5.3, as well as the previously
noted zlib fixes (see MDKSA-2002:023). The authors released 2.5.4 with
some additional zlib fixes, and all users are encouraged to upgrade to
this new version of rsync.

Affected versions: 7.1, 7.2, 8.0, 8.1, Corporate Server 1.0.1,
Single Network Firewall 7.2


Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2002:024
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=132272

Risk factor : High

CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.