Description: | Description:
The remote host is missing updates announced in advisory FLSA-2004:2003.
Rsync before 2.6.1 does not properly sanitize paths when running a read/write daemon without using chroot. This could allow a remote attacker to write files outside of the module' s path, depending on the privileges assigned to the rsync daemon. Users not running an rsync daemon, running a read-only daemon, or running a chrooted daemon are not affected by this issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0426 to this issue.
Versions of rsync up to and including version 2.6.2 contain a path sanitization issue. This issue could allow an attacker to read or write files outside of the rsync directory. This vulnerability is only exploitable when an rsync server is enabled and is not running within a chroot. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0792 to this issue.
Users of rsync are advised to upgrade to this updated package, which contains backported patches and is not affected by these issues.
Affected platforms: Redhat 7.3 Redhat 9
Solution: http://www.securityspace.com/smysecure/catid.html?in=FLSA-2004:2003 http://rsync.samba.org/#security_apr04 http://rsync.samba.org/#security_aug04
Risk factor : High
CVSS Score: 6.4
|