|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Slackware Local Security Checks >> SSA-2003-337-01 rsync security update Vulnerability Assessment Details
|
SSA-2003-337-01 rsync security update |
||
SSA-2003-337-01 rsync security update Detailed Explanation for this Vulnerability Assessment Rsync is a file transfer client and server. A security problem which may lead to unauthorized machine access or code execution has been fixed by upgrading to rsync-2.5.7. This problem only affects machines running rsync in daemon mode, and is easier to exploit if the non-default option "use chroot = no" is used in the /etc/rsyncd.conf config file. Any sites running an rsync server should upgrade immediately. For complete information, see the rsync home page: http://rsync.samba.org Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Michel Arboi |
||
Cables, Connectors |
Knoppix 9.1 Desktop DVD Live Portable Disc Disk GNU Linux Distro OS 64 Bit
$9.49
Knoppix 9.1 Desktop CD Live Portable Disc Disk GNU Linux Distro OS 64 Bit
$9.49
Knoppix 9.1 Desktop Live Portable USB Flash Thumb Drive GNU Linux OS 64 Bit
$14.49
Knoppix 9.1 Live OS USB | Ultimate System Repair & Recovery Tool | PC/MAC
$14.49
KNOPPIX 9.1 LINUX INSTALL & LIVE DVD
$9.99
Knoppix Live GNU Linux System 9.1 on Bootable CD / DVD / USB Flash Drive
$9.99
$12.00
Knoppix Linux Bootable OS v8.6 "Original Live Operating System" 16G USB Stick
$19.95
Knoppix Linux Bootable OS v8.6 "Original Live Operating System" 32G USB Stick
$20.30
Knoppix 9.1 USB | Ultimate Recovery, Vast Tools & Easy Linux Exploration | PC
$14.49
|
||
No Discussions have been posted on this vulnerability. |