Bug 407161 (CVE-2007-6199) - CVE-2007-6199 When rsync is run w/o chroot, symlinks that point outside daemon's root can be created
Summary: CVE-2007-6199 When rsync is run w/o chroot, symlinks that point outside daemo...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2007-6199
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://nvd.nist.gov/nvd.cfm?cvename=C...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2007-12-01 03:32 UTC by Lubomir Kundrak
Modified: 2021-11-12 19:46 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2007-12-05 17:52:17 UTC


Attachments (Terms of Use)

Description Lubomir Kundrak 2007-12-01 03:32:38 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2007-6199 to the following vulnerability:

rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy.

References:

http://rsync.samba.org/security.html#s3_0_0
http://www.securityfocus.com/bid/26638
http://securitytracker.com/id?1019012
http://secunia.com/advisories/27863

Comment 1 Lubomir Kundrak 2007-12-05 17:52:17 UTC
Red Hat does not consider this a security issue.  Versions of rsync as shipped
with Red Hat Enterprise Linux 2.1, 3, 4 and 5 behave as expected and that
behavior was well documented.  This is a feature enhancement that allows more
fine grained control over creating symbolic links in writable rsync modules.


Note You need to log in before you can comment on or make changes to this bug.