![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.60240 |
Categoría: | Mandrake Local Security Checks |
Título: | Mandrake Security Advisory MDVSA-2008:011 (rsync) |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host is missing an update to rsync announced via advisory MDVSA-2008:011. rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy. (CVE-2007-6199) Unspecified vulnerability in rsync before 3.0.0pre6, when running a writable rsync daemon, allows remote attackers to bypass exclude, exclude_from, and filter and read or write hidden files via (1) symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest options. (CVE-2007-6200) This update fixes these issues. It is recommended users (specially system and network administrators) read the manpage about the introduced munge symlinks feature. This update also upgrades rsync to version 2.6.9 for all Mandriva Linux versions earlier than 2008.0. Affected: 2007.0, 2007.1, 2008.0, Corporate 3.0, Corporate 4.0 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2008:011 http://rsync.samba.org/security.html#s3_0_0 Risk factor : Critical CVSS Score: 10.0 |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-6199 http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html BugTraq ID: 26638 http://www.securityfocus.com/bid/26638 Bugtraq: 20080212 FLEA-2008-0004-1 rsync (Google Search) http://www.securityfocus.com/archive/1/487991/100/0/threaded http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:011 http://securitytracker.com/id?1019012 http://secunia.com/advisories/27853 http://secunia.com/advisories/27863 http://secunia.com/advisories/28412 http://secunia.com/advisories/28457 http://secunia.com/advisories/31326 http://secunia.com/advisories/61005 SuSE Security Announcement: SUSE-SR:2008:001 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html http://www.vupen.com/english/advisories/2007/4057 http://www.vupen.com/english/advisories/2008/2268 Common Vulnerability Exposure (CVE) ID: CVE-2007-6200 BugTraq ID: 26639 http://www.securityfocus.com/bid/26639 http://www.redhat.com/support/errata/RHSA-2011-0999.html |
Copyright | Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |