Mandrake Linux Security Advisory : rsync (MDKSA-2002:024)

This script is Copyright (C) 2004-2013 Tenable Network Security, Inc.


Synopsis :

The remote Mandrake Linux host is missing a security update.

Description :

Ethan Benson discovered a bug in rsync where the supplementary groups
that the rsync daemon runs as (such as root) would not be removed from
the server process after changing to the specified unprivileged uid
and gid. This seems only serious if rsync is called using 'rsync
--daemon' from the command line where it will inherit the group of the
user starting the server (usually root). Note that, by default,
Mandrake Linux uses xinetd to handle connections to the rsync daemon.
This was fixed upstream in version 2.5.3, as well as the previously
noted zlib fixes (see MDKSA-2002:023). The authors released 2.5.4 with
some additional zlib fixes, and all users are encouraged to upgrade to
this new version of rsync.

See also :

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=132272

Solution :

Update the affected rsync package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 13932 (mandrake_MDKSA-2002-024.nasl)

Bugtraq ID:

CVE ID: CVE-2002-0059
CVE-2002-0080

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now