RHEL 2.1 / 3 : rsync (RHSA-2004:192)

medium Nessus Plugin ID 12497


The remote Red Hat host is missing a security update.


An updated rsync package that fixes a directory traversal security flaw is now available.

Rsync is a program for synchronizing files over a network.

Rsync before 2.6.1 does not properly sanitize paths when running a read/write daemon without using chroot. This could allow a remote attacker to write files outside of the module's 'path', depending on the privileges assigned to the rsync daemon. Users not running an rsync daemon, running a read-only daemon, or running a chrooted daemon are not affected by this issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0426 to this issue.

Users of Rsync are advised to upgrade to this updated package, which contains a backported patch and is not affected by this issue.


Update the affected rsync package.

See Also




Plugin Details

Severity: Medium

ID: 12497

File Name: redhat-RHSA-2004-192.nasl

Version: 1.25

Type: local

Agent: unix

Published: 7/6/2004

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information


Risk Factor: Low

Score: 3.4


Risk Factor: Medium

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:rsync, cpe:/o:redhat:enterprise_linux:2.1, cpe:/o:redhat:enterprise_linux:3

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 5/19/2004

Vulnerability Publication Date: 7/7/2004

Reference Information

CVE: CVE-2004-0426

RHSA: 2004:192