GLSA-200407-10 : rsync: Directory traversal in rsync daemon

Medium Nessus Plugin ID 14543


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-200407-10 (rsync: Directory traversal in rsync daemon)

When rsyncd is used without chroot ('use chroot = false' in the rsyncd.conf file), the paths sent by the client are not checked thoroughly enough. If rsyncd is used with read-write permissions ('read only = false'), this vulnerability can be used to write files anywhere with the rights of the rsyncd daemon. With default Gentoo installations, rsyncd runs in a chroot, without write permissions and with the rights of the 'nobody' user.
Impact :

On affected configurations and if the rsync daemon runs under a privileged user, a remote client can exploit this vulnerability to completely compromise the host.
Workaround :

You should never set the rsync daemon to run with 'use chroot = false'. If for some reason you have to run rsyncd without a chroot, then you should not set 'read only = false'.


All users should update to the latest version of the rsync package.
# emerge sync # emerge -pv '>=net-misc/rsync-2.6.0-r2' # emerge '>=net-misc/rsync-2.6.0-r2'

See Also

Plugin Details

Severity: Medium

ID: 14543

File Name: gentoo_GLSA-200407-10.nasl

Version: $Revision: 1.14 $

Type: local

Published: 2004/08/30

Modified: 2015/04/13

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:rsync, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 2004/07/12

Vulnerability Publication Date: 2004/04/29

Reference Information

CVE: CVE-2004-0426

OSVDB: 5731

GLSA: 200407-10