Your submission was sent successfully! Close

CVE-2007-6199

Published: 1 December 2007

rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy.

Priority

Low

Status

Package Release Status
rsync
Launchpad, Ubuntu, Debian
dapper Ignored
(reached end-of-life)
edgy Needed
(reached end-of-life)
feisty Needed
(reached end-of-life)
gutsy Needed
(reached end-of-life)
hardy Not vulnerable
(2.6.9-6ubuntu1)
intrepid Not vulnerable
(2.6.9-6ubuntu1)
jaunty Not vulnerable
(2.6.9-6ubuntu1)
karmic Not vulnerable
(2.6.9-6ubuntu1)
lucid Not vulnerable
(2.6.9-6ubuntu1)
maverick Not vulnerable
(2.6.9-6ubuntu1)
natty Not vulnerable
(2.6.9-6ubuntu1)
oneiric Not vulnerable
(2.6.9-6ubuntu1)
upstream
Released (2.6.9-5.1)
Patches:
upstream: http://rsync.samba.org/ftp/rsync/munge-symlinks-2.6.9.diff

Notes

AuthorNote
jdstrand
lowering priority as it is only for rsyncd while not running in
chroot.  This is a not-recommended, non-standard configuration. Above patch
adds a configuration option to make this configuration 'safer'.

References