Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-6199

Опубликовано: 28 нояб. 2007
Источник: redhat
EPSS Низкий

Описание

rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy.

Отчет

Red Hat does not consider this to be a security issue. Versions of rsync as shipped with Red Hat Enterprise Linux 2.1, 3, 4 and 5 behave as expected and that behavior was well documented.

Дополнительная информация

https://bugzilla.redhat.com/show_bug.cgi?id=407161When rsync is run w/o chroot, symlinks that point outside daemon's root can be created

EPSS

Процентиль: 90%
0.05819
Низкий

Связанные уязвимости

ubuntu
почти 18 лет назад

rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy.

nvd
почти 18 лет назад

rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy.

debian
почти 18 лет назад

rsync before 3.0.0pre6, when running a writable rsync daemon that is n ...

github
больше 3 лет назад

rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy.

EPSS

Процентиль: 90%
0.05819
Низкий