Security hole in rsync

    Date08 Dec 1999
    CategorySuSE
    3519
    Posted ByLinuxSecurity Advisories
    The security breach occurs when you try to transfer an empty directory into a non-existent directory. In that case rsync sets the permissions of the working directory to those of the empty directory; this means, that the permissions of your home directory are changed to the file access mode of the empty directory if you do a remote rsync by using ssh/rsh.
    ______________________________________________________________________________
    
                            SuSE Security Announcement
    
            Package:  rsync-2.2.1 and previous
            Date:     Tue Aug 25 07:45:15 CEST 1999
            Affected: all Linux distributions using rsync
    ______________________________________________________________________________
    
    A security hole was discovered in the package mentioned above.
    Please update as soon as possible or disable the service if you are using
    this software on your SuSE Linux installation(s).
    
    Other Linux distributions or operating systems might be affected as
    well, please contact your vendor for information about this issue.
    
    Please note, that that we provide this information on as "as-is" basis only.
    There is no warranty whatsoever and no liability for any direct, indirect or
    incidental damage arising from this information or the installation of
    the update package.
    _____________________________________________________________________________
    
    1. Problem Description
    
      The security breach occurs when you try to transfer an empty
      directory into a non-existent directory.
      In that case rsync sets the permissions of the working directory
      to those of the empty directory; this means, that the permissions
      of your home directory are changed to the file access mode of the
      empty directory if you do a remote rsync by using ssh/rsh.
    
    2. Impact
    
      If an attacker is successful in exploiting this bug, s/he could gain
      access to protected files in a users home directory.
      This could lead to local root compromise, i.e. by modifying the PATH
      environment variable and smuggleing tronjan horse programs in the
      admins home directory or elsewhere. 
    
    3. Solution
    
      Updated the rsync package from our FTP server.
    ______________________________________________________________________________
    
    Here are the md5 checksums of the upgrade packages, please verify these
    before installing the new packages:
    
      ca7573738420869c7750a25d53e7ac95  rsync-2.3.1-0.i386.rpm
    ______________________________________________________________________________
    
    You will find the update on our ftp-Server:
      ftp://ftp.suse.com/pub/suse/i386/update/6.2/n1/rsync.rpm
    
    Webpage for patches:
      http://www.suse.de/patches/index.html
    
    or try the following web pages for a list of mirrors:
      http://www.suse.de/ftp.html
      http://www.suse.com/ftp_new.html
    
    ______________________________________________________________________________
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"22","type":"x","order":"1","pct":55,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.5,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":32.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.