|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA404] DSA-404-1 rsync Vulnerability Assessment Details
|
[DSA404] DSA-404-1 rsync |
||
DSA-404-1 rsync Detailed Explanation for this Vulnerability Assessment The rsync team has received evidence that a vulnerability in all versions of rsync prior to 2.5.7, a fast remote file copy program, was recently used in combination with a Linux kernel vulnerability to compromise the security of a public rsync server. While this heap overflow vulnerability could not be used by itself to obtain root access on an rsync server, it could be used in combination with the recently announced do_brk() vulnerability in the Linux kernel to produce a full remote compromise. Please note that this vulnerability only affects the use of rsync as an "rsync server". To see if you are running a rsync server you should use the command "netstat -a -n" to see if you are listening on TCP port 873. If you are not listening on TCP port 873 then you are not running an rsync server. For the stable distribution (woody) this problem has been fixed in version 2.5.5-0.2. For the unstable distribution (sid) this problem has been fixed in version 2.5.6-1.1. However, since the Debian infrastructure is not yet fully functional after the recent break-in, packages for the unstable distribution are not able to enter the archive for a while. Hence they were placed in Joey's home directory on the security machine. We recommend that you upgrade your rsync package immediately if you are providing remote sync services. If you are running testing and provide remote sync services please use the packages for woody. Solution : http://www.debian.org/security/2003/dsa-404 Network Security Threat Level: High Networks Security ID: 9153 Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi |
||
Cables, Connectors |
Cisco SG95-16 16-Port Gigabit Switch SG95-16-KR
$47.00
8 Ports Unmanaged Industrial Ethernet Switch Network Gigabit Ethernet Switch
$76.50
Cisco (SG100D-05-UK) 5-Ports External Ethernet Switch
$40.00
100Mbps Fiber Optic Media Converter 16 SC Optical Port 2 RJ45 10/100/1000Mbps
$462.99
HP 2530-48G 48 Port Gigabit Ethernet Network Switch J9775A
$30.95
Linksys SE3008 8 Ports Rack Mountable Gigabit Ethernet Switch
$21.99
New Linksys SE3005 5-port Gigabit Ethernet Switch
$18.99
HP ProCurve 2530-24G J9776A 24 Port Gigabit Ethernet Managed Network Switch
$34.99
Juniper Networks EX3300-48P 48-Port PoE+ 4x SFP+ Network Switch w/ Power Cord
$43.95
Netgear Prosafe Plus JGS524PE 24 Port Gigabit Switch 12 Port PoE JGS524PE-100NAS
$129.98
|
||
No Discussions have been posted on this vulnerability. |