Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2002:009: rsync

Vulnerability Assessment Details

MDKSA-2002:009: rsync

Vulnerability Assessment Summary
Check for the version of the rsync package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2002:009 (rsync).

Sebastian Krahmer of the SuSE Security Team performed an audit on the rsync tool
and discovered that in several places signed and unsigned numbers were mixed,
with the end result being insecure code. These flaws could be abused by remote
users to write 0 bytes into rsync's memory and trick rsync into executing
arbitrary code on the server.
It is recommended that all Mandrake Linux users update rsync immediately. As
well, rsync server administrators should seriously consider making use of the
'use chroot', 'read only', and 'uid' options as these can significantly reduce
the impact that security problems in rsync (or elsewhere) have on the server.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

LOT OF 6: Samsung 2GB 1Rx8 PC3-10600S-09-11-B2 Memory
LOT OF 6: Samsung 2GB 1Rx8 PC3-10600S-09-11-B2 Memory pictureSamsung SSD SM841 mSATA 256GB Model:MZ-MPD256D
Samsung SSD SM841 mSATA 256GB Model:MZ-MPD256D picture


No Discussions have been posted on this vulnerability.