![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.60240 |
Category: | Mandrake Local Security Checks |
Title: | Mandrake Security Advisory MDVSA-2008:011 (rsync) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to rsync announced via advisory MDVSA-2008:011. rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy. (CVE-2007-6199) Unspecified vulnerability in rsync before 3.0.0pre6, when running a writable rsync daemon, allows remote attackers to bypass exclude, exclude_from, and filter and read or write hidden files via (1) symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest options. (CVE-2007-6200) This update fixes these issues. It is recommended users (specially system and network administrators) read the manpage about the introduced munge symlinks feature. This update also upgrades rsync to version 2.6.9 for all Mandriva Linux versions earlier than 2008.0. Affected: 2007.0, 2007.1, 2008.0, Corporate 3.0, Corporate 4.0 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2008:011 http://rsync.samba.org/security.html#s3_0_0 Risk factor : Critical CVSS Score: 10.0 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-6199 http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html BugTraq ID: 26638 http://www.securityfocus.com/bid/26638 Bugtraq: 20080212 FLEA-2008-0004-1 rsync (Google Search) http://www.securityfocus.com/archive/1/487991/100/0/threaded http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:011 http://securitytracker.com/id?1019012 http://secunia.com/advisories/27853 http://secunia.com/advisories/27863 http://secunia.com/advisories/28412 http://secunia.com/advisories/28457 http://secunia.com/advisories/31326 http://secunia.com/advisories/61005 SuSE Security Announcement: SUSE-SR:2008:001 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html http://www.vupen.com/english/advisories/2007/4057 http://www.vupen.com/english/advisories/2008/2268 Common Vulnerability Exposure (CVE) ID: CVE-2007-6200 BugTraq ID: 26639 http://www.securityfocus.com/bid/26639 http://www.redhat.com/support/errata/RHSA-2011-0999.html |
Copyright | Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |