Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 538-1 (rsync)

Information

Severity

Severity

Medium

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

6.4

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:N

Solution Type

Solution Type

Vendor Patch

Created

Created

16 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing an update to rsync announced via advisory DSA 538-1.

Insight

Insight

The rsync developers have discoverd a security related problem in rsync, a fast remote file copy program, which offers an attacker to access files outside of the defined directory. To exploit this path-sanitizing bug, rsync has to run in daemon mode with the chroot option being disabled. It does not affect the normal send/receive filenames that specify what files should be transferred. It does affect certain option paths that cause auxiliary files to be read or written. For the stable distribution (woody) this problem has been fixed in version 2.5.5-0.6. For the unstable distribution (sid) this problem has been fixed in version 2.6.2-3. We recommend that you upgrade your rsync package.

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20538-1

Common Vulnerabilities and Exposures (CVE)