Lucene search

K

rsync path sanitation vulnerability

🗓️ 03 Nov 2005 00:00:00Reported by Copyright (C) 2004 David MaciejakType 
openvas
 openvas
🔗 plugins.openvas.org👁 11 Views

rsync path sanitation vulnerability. A flaw in rsync version allows remote attackers to gain access to the system for reading or writing arbitrary files. Successful exploitation requires the rsync daemon to not be running chrooted. Upgrade to rsync 2.6.3 or newer

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
OpenVAS
rsync path sanitation vulnerability
3 Nov 200500:00
openvas
OpenVAS
FreeBSD Ports: rsync
4 Sep 200800:00
openvas
OpenVAS
Gentoo Security Advisory GLSA 200408-17 (rsync)
24 Sep 200800:00
openvas
OpenVAS
FreeBSD Ports: rsync
4 Sep 200800:00
openvas
OpenVAS
Slackware: Security Advisory (SSA:2004-285-01)
10 Sep 201200:00
openvas
OpenVAS
Gentoo Security Advisory GLSA 200408-17 (rsync)
24 Sep 200800:00
openvas
OpenVAS
Debian: Security Advisory (DSA-538)
17 Jan 200800:00
openvas
OpenVAS
Slackware Advisory SSA:2004-285-01 rsync
11 Sep 201200:00
openvas
OpenVAS
Debian Security Advisory DSA 538-1 (rsync)
17 Jan 200800:00
openvas
UbuntuCve
CVE-2004-0792
20 Oct 200400:00
ubuntucve
Rows per page
SourceLink
securityfocuswww.securityfocus.com/bid/10938
# SPDX-FileCopyrightText: 2004 David Maciejak
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.14223");
  script_version("2023-08-01T13:29:10+0000");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/10938");
  script_cve_id("CVE-2004-0792");
  script_tag(name:"last_modification", value:"2023-08-01 13:29:10 +0000 (Tue, 01 Aug 2023)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:N");
  script_name("rsync path sanitation vulnerability");
  script_category(ACT_GATHER_INFO);
  script_family("Gain a shell remotely");
  script_copyright("Copyright (C) 2004 David Maciejak");
  script_dependencies("gb_rsync_remote_detect.nasl");
  script_require_ports("Services/rsync", 873);
  script_mandatory_keys("rsync/protocol_banner/available");

  script_tag(name:"summary", value:"A vulnerability has been reported in rsync, which potentially can be exploited
  by malicious users to read or write arbitrary files on a vulnerable system.");

  script_tag(name:"impact", value:"There is a flaw in this version of rsync which, due to an input validation
  error, would allow a remote attacker to gain access to the remote system.");

  script_tag(name:"insight", value:"An attacker, exploiting this flaw, would need network access to the TCP port.

  Successful exploitation requires that the rsync daemon is *not* running chrooted.");

  script_tag(name:"solution", value:"Upgrade to rsync 2.6.3 or newer.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  exit(0);
}

include("rsync_func.inc");
include("misc_func.inc");
include("port_service_func.inc");

port = rsync_get_port( default:873 );

protocol = get_kb_item( "rsync/protocol_banner/" + port );
if( ! protocol )
  exit( 0 );

# rsyncd speaking protocol 28 are not vulnerable
if( ereg( pattern:"(@RSYNCD:|protocol version) (1[0-9]|2[0-8])", string:protocol ) ) {
  report = "Detected and affected RSYNCD protocol: " + protocol;
  security_message( port:port, data:report );
  exit( 0 );
}

exit( 99 );

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
03 Nov 2005 00:00Current
6.2Medium risk
Vulners AI Score6.2
CVSS26.4
EPSS0.00839
11
.json
Report