CVE-2007-6199
Severity CVSS v4.0:
Pending analysis
Type:
CWE-16
Configuration Errors
Publication date:
01/12/2007
Last modified:
09/04/2025
Description
rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:slackware:slackware_linux:11.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:slackware:slackware_linux:12.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rsync:rsync:2.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rsync:rsync:2.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rsync:rsync:2.3.2_1.2alpha:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rsync:rsync:2.3.2_1.2arm:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rsync:rsync:2.3.2_1.2intel:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rsync:rsync:2.3.2_1.2m68k:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rsync:rsync:2.3.2_1.2ppc:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html
- http://rsync.samba.org/security.html#s3_0_0
- http://secunia.com/advisories/27853
- http://secunia.com/advisories/27863
- http://secunia.com/advisories/28412
- http://secunia.com/advisories/28457
- http://secunia.com/advisories/31326
- http://secunia.com/advisories/61005
- http://securitytracker.com/id?1019012=
- http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15549.html
- http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0257
- http://www.mandriva.com/en/security/advisories?name=MDVSA-2008%3A011
- http://www.securityfocus.com/archive/1/487991/100/0/threaded
- http://www.securityfocus.com/bid/26638
- http://www.vupen.com/english/advisories/2007/4057
- http://www.vupen.com/english/advisories/2008/2268
- http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html
- http://rsync.samba.org/security.html#s3_0_0
- http://secunia.com/advisories/27853
- http://secunia.com/advisories/27863
- http://secunia.com/advisories/28412
- http://secunia.com/advisories/28457
- http://secunia.com/advisories/31326
- http://secunia.com/advisories/61005
- http://securitytracker.com/id?1019012=
- http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15549.html
- http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0257
- http://www.mandriva.com/en/security/advisories?name=MDVSA-2008%3A011
- http://www.securityfocus.com/archive/1/487991/100/0/threaded
- http://www.securityfocus.com/bid/26638
- http://www.vupen.com/english/advisories/2007/4057
- http://www.vupen.com/english/advisories/2008/2268



