SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Rsync Vendors:   rsync.samba.org
Rsync Bugs Let Users Bypass Chroot and Exclude/Filter Access Controls
SecurityTracker Alert ID:  1019012
SecurityTracker URL:  http://securitytracker.com/id/1019012
CVE Reference:   CVE-2007-6199, CVE-2007-6200   (Links to External Site)
Updated:  Dec 7 2007
Original Entry Date:  Nov 29 2007
Impact:   Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 3.0.0pre6
Description:   Two vulnerabilities were reported in Rsync. A remote user can bypass access controls to access files on the target system.

Users that have configured rsync as a writable rsync daemon are affected.

If the daemon is configured with the 'use chroot = no' setting, a remote user can cause rsync to create a symbolic link to a file located outside of the module's hierarchy.

If the daemon is configured with an "exclude", "exclude from", or "filter" option, a remote user can access restricted files. The remote user may be able to write to the file (in accordance with the file's permission).

Impact:   A remote user can bypass access controls to access files on the target system.
Solution:   The vendor has issued a fixed version (3.0.0pre6).

Also, a patch is available for version 2.6.9.

The Rsync advisory is available at:

http://rsync.samba.org/security.html

Vendor URL:  rsync.samba.org/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Aug 1 2008 (Apple Issues Fix) Rsync Bugs Let Users Bypass Chroot and Exclude/Filter Access Controls
Apple has issued a fix for Mac OS X.
Jul 22 2011 (Red Hat Issues Fix) Rsync Bugs Let Users Bypass Chroot and Exclude/Filter Access Controls
Red Hat has issued a fix for Red Hat Enterprise Linux 5.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC