Fedora Core 1 : rsync-2.5.7-5.fc1 (2004-116)

This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.


Synopsis :

The remote Fedora Core host is missing a security update.

Description :

Rsync before 2.6.1 does not properly sanitize paths when running a
read/write daemon without using chroot. This could allow a remote
attacker to write files outside of the module's 'path', depending on
the privileges assigned to the rsync daemon. Users not running an
rsync daemon, running a read-only daemon, or running a chrooted daemon
are not affected by this issue. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-0426
to this issue.

Updated packages were made available in June 2004 however the original
update notification email did not make it to fedora-announce-list at
that time.

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.nessus.org/u?4194a7c5

Solution :

Update the affected rsync and / or rsync-debuginfo packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

Family: Fedora Local Security Checks

Nessus Plugin ID: 13695 (fedora_2004-116.nasl)

Bugtraq ID:

CVE ID: CVE-2004-0426

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now