Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.52791
Category:Fedora Local Security Checks
Title:Fedora Legacy Security Advisory FLSA-2004:2003
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory FLSA-2004:2003.

Rsync before 2.6.1 does not properly sanitize paths when running a
read/write daemon without using chroot. This could allow a remote
attacker
to write files outside of the module'
s path, depending on the
privileges
assigned to the rsync daemon. Users not running an rsync daemon, running
a
read-only daemon, or running a chrooted daemon are not affected by this
issue. The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2004-0426 to this issue.

Versions of rsync up to and including version 2.6.2 contain a path
sanitization issue. This issue could allow an attacker to read or write
files outside of the rsync directory. This vulnerability is only
exploitable when an rsync server is enabled and is not running within a
chroot. The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2004-0792 to this issue.

Users of rsync are advised to upgrade to this updated package, which
contains backported patches and is not affected by these issues.

Affected platforms:
Redhat 7.3
Redhat 9

Solution:
http://www.securityspace.com/smysecure/catid.html?in=FLSA-2004:2003
http://rsync.samba.org/#security_apr04
http://rsync.samba.org/#security_aug04

Risk factor : High

CVSS Score:
6.4

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-0426
BugTraq ID: 10247
http://www.securityfocus.com/bid/10247
Bugtraq: 20040521 [OpenPKG-SA-2004.025] OpenPKG Security Advisory (rsync) (Google Search)
http://marc.info/?l=bugtraq&m=108515912212018&w=2
Computer Incident Advisory Center Bulletin: O-134
http://www.ciac.org/ciac/bulletins/o-134.shtml
Computer Incident Advisory Center Bulletin: O-212
http://www.ciac.org/ciac/bulletins/o-212.shtml
Debian Security Information: DSA-499 (Google Search)
http://www.debian.org/security/2004/dsa-499
http://www.gentoo.org/security/en/glsa/glsa-200407-10.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2004:042
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9495
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A967
http://www.redhat.com/support/errata/RHSA-2004-192.html
http://secunia.com/advisories/11514
http://secunia.com/advisories/11515
http://secunia.com/advisories/11523
http://secunia.com/advisories/11537
http://secunia.com/advisories/11583
http://secunia.com/advisories/11669
http://secunia.com/advisories/11688
http://secunia.com/advisories/11993
http://secunia.com/advisories/12054
http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.403462
http://www.trustix.net/errata/misc/2004/TSL-2004-0024-rsync.asc.txt
XForce ISS Database: rsync-write-files(16014)
https://exchange.xforce.ibmcloud.com/vulnerabilities/16014
Common Vulnerability Exposure (CVE) ID: CVE-2004-0792
Bugtraq: 20040816 TSSA-2004-020-ES - rsync (Google Search)
http://marc.info/?l=bugtraq&m=109268147522290&w=2
Bugtraq: 20040817 LNSA-#2004-0017: rsync (Aug, 17 2004) (Google Search)
http://marc.info/?l=bugtraq&m=109277141223839&w=2
Debian Security Information: DSA-538 (Google Search)
http://www.debian.org/security/2004/dsa-538
http://www.gentoo.org/security/en/glsa/glsa-200408-17.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2004:083
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10561
SuSE Security Announcement: SUSE-SA:2004:026 (Google Search)
http://www.novell.com/linux/security/advisories/2004_26_rsync.html
http://www.trustix.net/errata/2004/0042/
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.