Lucene search

K
suseSuseSUSE-SA:2004:026
HistoryAug 16, 2004 - 2:49 p.m.

remote system compromise in rsync

2004-08-1614:49:13
lists.opensuse.org
11

0.006 Low

EPSS

Percentile

77.9%

The rsync-team released an advisory about a security problem in rsync. If rsync is running in daemon-mode and without a chroot environment it is possible for a remote attacker to trick rsyncd into creating an absolute pathname while sanitizing it. As a result it is possible to read/write from/to files outside the rsync directory.

Solution

As a temporary workaround we suggest to keep the chroot-option of rsyncd enabled or to avoid the daemon-mode and use SSH as transport channel if possible.