|
|
Subscribe / Log in / New account

rsync remote file write attack

Package(s):rsync CVE #(s):CAN-2004-0426
Created:April 30, 2004 Updated:July 12, 2004
Description: See the rsync homepage for the April 2004 advisory: "There is a security problem in all versions prior to 2.6.1 that affects only people running a read/write daemon WITHOUT using chroot. If the user privs that such an rsync daemon is using is anything above "nobody", you are at risk of someone crafting an attack that could write a file outside of the module's "path" setting (where all its files should be stored). Please either enable chroot or upgrade to 2.6.1. People not running a daemon, running a read-only daemon, or running a chrooted daemon are totally unaffected."
Alerts:
Gentoo 200407-10 rsync 2004-07-12
Fedora FEDORA-2004-116 rsync 2004-07-01
Whitebox WBSA-2004:192-01 rsync 2004-06-10
Debian DSA-499-2 rsync 2004-06-02
OpenPKG OpenPKG-SA-2004.025 rsync 2004-05-21
Red Hat RHSA-2004:192-01 rsync 2004-05-19
Mandrake MDKSA-2004:042 rsync 2004-05-10
Slackware SSA:2004-124-01 rsync 2004-05-02
Debian DSA-499-1 rsync 2004-05-01
Trustix TSLSA-2004-0024 rsync 2004-04-29

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds