Mandrake Linux Security Advisory : rsync (MDKSA-2003:111)

high Nessus Plugin ID 14093

Synopsis

The remote Mandrake Linux host is missing a security update.

Description

A vulnerability was discovered in all versions of rsync prior to 2.5.7 that was recently used in conjunction with the Linux kernel do_brk() vulnerability to compromise a public rsync server.

This heap overflow vulnerability, by itself, cannot yield root access, however it does allow arbitrary code execution on the host running rsync as a server. Also note that this only affects hosts running rsync in server mode (listening on port 873, typically under xinetd).

Solution

Update the affected rsync package.

See Also

http://rsync.samba.org/index.html

Plugin Details

Severity: High

ID: 14093

File Name: mandrake_MDKSA-2003-111.nasl

Version: 1.21

Type: local

Published: 7/31/2004

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:rsync, cpe:/o:mandrakesoft:mandrake_linux:9.0, cpe:/o:mandrakesoft:mandrake_linux:9.1, cpe:/o:mandrakesoft:mandrake_linux:9.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/4/2003

Exploitable With

CANVAS (CANVAS)

Reference Information

CVE: CVE-2003-0962

MDKSA: 2003:111