This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
An updated rsync package that fixes a directory traversal security
flaw is now available.
Rsync is a program for synchronizing files over a network.
Rsync before 2.6.1 does not properly sanitize paths when running a
read/write daemon without using chroot. This could allow a remote
attacker to write files outside of the module's 'path', depending on
the privileges assigned to the rsync daemon. Users not running an
rsync daemon, running a read-only daemon, or running a chrooted daemon
are not affected by this issue. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-0426
to this issue.
Users of Rsync are advised to upgrade to this updated package, which
contains a backported patch and is not affected by this issue.
See also :
Update the affected rsync package.
Risk factor :
Medium / CVSS Base Score : 5.0
Family: Red Hat Local Security Checks
Nessus Plugin ID: 12497 ()
CVE ID: CVE-2004-0426
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.