exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2008-011

Mandriva Linux Security Advisory 2008-011
Posted Jan 12, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy. Unspecified vulnerability in rsync before 3.0.0pre6, when running a writable rsync daemon, allows remote attackers to bypass exclude, exclude_from, and filter and read or write hidden files via (1) symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest options.

tags | advisory, remote
systems | linux, mandriva
advisories | CVE-2007-6199, CVE-2007-6200
SHA-256 | 607f0580fdeb64cd7292d45f76207bc72df6592eb01c1339686bc405ec7300f1

Mandriva Linux Security Advisory 2008-011

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:011
http://www.mandriva.com/security/
_______________________________________________________________________

Package : rsync
Date : January 11, 2008
Affected: 2007.0, 2007.1, 2008.0, Corporate 3.0, Corporate 4.0
_______________________________________________________________________

Problem Description:

rsync before 3.0.0pre6, when running a writable rsync daemon that is
not using chroot, allows remote attackers to access restricted files
via unknown vectors that cause rsync to create a symlink that points
outside of the module's hierarchy. (CVE-2007-6199)

Unspecified vulnerability in rsync before 3.0.0pre6, when running a
writable rsync daemon, allows remote attackers to bypass exclude,
exclude_from, and filter and read or write hidden files via (1)
symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest
options. (CVE-2007-6200)

This update fixes these issues. It is recommended users (specially
system and network administrators) read the manpage about the
introduced munge symlinks feature.

This update also upgrades rsync to version 2.6.9 for all Mandriva
Linux versions earlier than 2008.0.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6199
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6200
http://rsync.samba.org/security.html#s3_0_0
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.0:
fdea773146cff55a58e6c021a411d0d9 2007.0/i586/rsync-2.6.9-0.1mdv2007.0.i586.rpm
93afe1627418872e14aacf9ee2ed4d18 2007.0/SRPMS/rsync-2.6.9-0.1mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
d9f0b368c1432feba67f51f5d4053d06 2007.0/x86_64/rsync-2.6.9-0.1mdv2007.0.x86_64.rpm
93afe1627418872e14aacf9ee2ed4d18 2007.0/SRPMS/rsync-2.6.9-0.1mdv2007.0.src.rpm

Mandriva Linux 2007.1:
62323582b53e066d60edd4a38c0edcee 2007.1/i586/rsync-2.6.9-1.2mdv2007.1.i586.rpm
b4e0a376cd14cc27d6006f3844e1b576 2007.1/SRPMS/rsync-2.6.9-1.2mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
3f710d1bfb189380264dd57a701b069a 2007.1/x86_64/rsync-2.6.9-1.2mdv2007.1.x86_64.rpm
b4e0a376cd14cc27d6006f3844e1b576 2007.1/SRPMS/rsync-2.6.9-1.2mdv2007.1.src.rpm

Mandriva Linux 2008.0:
55755e81158e1664c48ae5fa69130ca1 2008.0/i586/rsync-2.6.9-5.1mdv2008.0.i586.rpm
e161a0b5150e3d74f8671dbf0aa9e2aa 2008.0/SRPMS/rsync-2.6.9-5.1mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
df57566d88efb9493b6f417c562d5e3f 2008.0/x86_64/rsync-2.6.9-5.1mdv2008.0.x86_64.rpm
e161a0b5150e3d74f8671dbf0aa9e2aa 2008.0/SRPMS/rsync-2.6.9-5.1mdv2008.0.src.rpm

Corporate 3.0:
7949dd695db813c06f9fc7db853864f8 corporate/3.0/i586/rsync-2.6.9-0.1.C30mdk.i586.rpm
21df68a34ef7732f1a0685d850ceb46d corporate/3.0/SRPMS/rsync-2.6.9-0.1.C30mdk.src.rpm

Corporate 3.0/X86_64:
5a4327131d15f9b008b32471eac47877 corporate/3.0/x86_64/rsync-2.6.9-0.1.C30mdk.x86_64.rpm
21df68a34ef7732f1a0685d850ceb46d corporate/3.0/SRPMS/rsync-2.6.9-0.1.C30mdk.src.rpm

Corporate 4.0:
36f429d7b5f59514b357739cfa022058 corporate/4.0/i586/rsync-2.6.9-0.1.20060mlcs4.i586.rpm
522dab65e48a0d2ce46d7bd29374c5ce corporate/4.0/SRPMS/rsync-2.6.9-0.1.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
2c57404df93fae7ac16e27f15bf1cc16 corporate/4.0/x86_64/rsync-2.6.9-0.1.20060mlcs4.x86_64.rpm
522dab65e48a0d2ce46d7bd29374c5ce corporate/4.0/SRPMS/rsync-2.6.9-0.1.20060mlcs4.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFHh+oYmqjQ0CJFipgRAhKUAKC9ix4UYefgXxzzJz0LwXaOmKZJOACg5Z3M
/gHpLmHqfbyhA9kjAP1qZzI=
=fCBW
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close