Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA404] DSA-404-1 rsync


Vulnerability Assessment Details

[DSA404] DSA-404-1 rsync

Vulnerability Assessment Summary
DSA-404-1 rsync

Detailed Explanation for this Vulnerability Assessment

The rsync team has received evidence that a vulnerability in all
versions of rsync prior to 2.5.7, a fast remote file copy program, was
recently used in combination with a Linux kernel vulnerability to
compromise the security of a public rsync server.
While this heap overflow vulnerability could not be used by itself to
obtain root access on an rsync server, it could be used in combination
with the recently announced do_brk() vulnerability in the Linux kernel
to produce a full remote compromise.
Please note that this vulnerability only affects the use of rsync as
an "rsync server". To see if you are running a rsync server you
should use the command "netstat -a -n" to see if you are listening on
TCP port 873. If you are not listening on TCP port 873 then you are
not running an rsync server.
For the stable distribution (woody) this problem has been fixed in
version 2.5.5-0.2.
For the unstable distribution (sid) this problem has been fixed in
version 2.5.6-1.1.
However, since the Debian infrastructure is not yet fully functional
after the recent break-in, packages for the unstable distribution are
not able to enter the archive for a while. Hence they were placed in
Joey's home directory on the security machine.
We recommend that you upgrade your rsync package immediately if you
are providing remote sync services. If you are running testing and
provide remote sync services please use the packages for woody.


Solution : http://www.debian.org/security/2003/dsa-404
Network Security Threat Level: High

Networks Security ID: 9153

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

AC Adapter Charger Power Supply Cord for Lenovo ThinkPad T42 T43 X40 X41 R50e
$9.98
AC Adapter Charger Power Supply Cord for Lenovo ThinkPad T42 T43 X40 X41 R50e pictureAC Adapter Charger Power Supply Cord for Lenovo ThinkPad T410 T410i T400s 2824
$10.98
AC Adapter Charger Power Supply Cord for Lenovo ThinkPad T410 T410i T400s 2824 pictureAC Adapter Charger Power Supply Cord for Lenovo ThinkPad T410 2522 2537 2539
$10.98
AC Adapter Charger Power Supply Cord for Lenovo ThinkPad T410 2522 2537 2539 pictureAC Adapter Charger Power Supply Cord for Lenovo ThinkPad T400s 2815 2823 T400s
$10.98
AC Adapter Charger Power Supply Cord for Lenovo ThinkPad T400s 2815 2823 T400s picture


Discussions

No Discussions have been posted on this vulnerability.