Nessus Plugin #15241

Plugin Index

Note: This file has been created from a downloaded version of the Nessus Plugins from http://www.nessus.org/. Therefore, the information here can be outdated.

[DSA404] DSA-404-1 rsync

Family:
Debian Local Security Checks
Category:
infos
Copyright:
This script is (C) 2004 Michel Arboi
Summary:
DSA-404-1 rsync
Version:
$Revision: 1.4 $
Cve_id:
CAN-2003-0962
Bugtraq_id:
9153
Xrefs:
DSA:404
Description:

The rsync team has received evidence that a vulnerability in all
versions of rsync prior to 2.5.7, a fast remote file copy program, was
recently used in combination with a Linux kernel vulnerability to
compromise the security of a public rsync server.
While this heap overflow vulnerability could not be used by itself to
obtain root access on an rsync server, it could be used in combination
with the recently announced do_brk() vulnerability in the Linux kernel
to produce a full remote compromise.
Please note that this vulnerability only affects the use of rsync as
an "rsync server". To see if you are running a rsync server you
should use the command "netstat -a -n" to see if you are listening on
TCP port 873. If you are not listening on TCP port 873 then you are
not running an rsync server.
For the stable distribution (woody) this problem has been fixed in
version 2.5.5-0.2.
For the unstable distribution (sid) this problem has been fixed in
version 2.5.6-1.1.
However, since the Debian infrastructure is not yet fully functional
after the recent break-in, packages for the unstable distribution are
not able to enter the archive for a while. Hence they were placed in
Joey's home directory on the security machine.
We recommend that you upgrade your rsync package immediately if you
are providing remote sync services. If you are running testing and
provide remote sync services please use the packages for woody.


Solution : http://www.debian.org/security/2003/dsa-404
Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.