ID CVE-2007-6199
Summary rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy.
References
Vulnerable Configurations
  • cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*
    cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*
  • cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
  • cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
    cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
  • cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
    cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
  • cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
    cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
  • cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
    cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
  • cpe:2.3:o:slackware:slackware_linux:11.0:*:*:*:*:*:*:*
    cpe:2.3:o:slackware:slackware_linux:11.0:*:*:*:*:*:*:*
  • cpe:2.3:o:slackware:slackware_linux:12.0:*:*:*:*:*:*:*
    cpe:2.3:o:slackware:slackware_linux:12.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.3.2_1.2alpha:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.3.2_1.2alpha:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.3.2_1.2arm:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.3.2_1.2arm:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.3.2_1.2intel:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.3.2_1.2intel:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.3.2_1.2m68k:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.3.2_1.2m68k:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.3.2_1.2ppc:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.3.2_1.2ppc:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.3.2_1.2sparc:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.3.2_1.2sparc:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.3.2_1.3:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.3.2_1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.4.8:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.6:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.6.7:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.6.8:*:*:*:*:*:*:*
  • cpe:2.3:a:rsync:rsync:2.6.9:*:*:*:*:*:*:*
    cpe:2.3:a:rsync:rsync:2.6.9:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 15-10-2018 - 21:50)
Impact:
Exploitability:
CWE CWE-16
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
refmap via4
apple APPLE-SA-2008-07-31
bid 26638
bugtraq 20080212 FLEA-2008-0004-1 rsync
confirm
mandriva MDVSA-2008:011
sectrack 1019012
secunia
  • 27853
  • 27863
  • 28412
  • 28457
  • 31326
  • 61005
suse SUSE-SR:2008:001
vupen
  • ADV-2007-4057
  • ADV-2008-2268
statements via4
contributor Mark J Cox
lastmodified 2007-12-06
organization Red Hat
statement Red Hat does not consider this to be a security issue. Versions of rsync as shipped with Red Hat Enterprise Linux 2.1, 3, 4 and 5 behave as expected and that behavior was well documented.
Last major update 15-10-2018 - 21:50
Published 01-12-2007 - 06:46
Last modified 15-10-2018 - 21:50
Back to Top