CVE-2007-6200
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
01/12/2007
Last modified:
15/10/2018
Description
Unspecified vulnerability in rsync before 3.0.0pre6, when running a writable rsync daemon, allows remote attackers to bypass exclude, exclude_from, and filter and read or write hidden files via (1) symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest options.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:slackware:slackware_linux:11.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:slackware:slackware_linux:12.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsync:rsync:2.3.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsync:rsync:2.3.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsync:rsync:2.3.2_1.2alpha:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsync:rsync:2.3.2_1.2arm:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsync:rsync:2.3.2_1.2intel:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsync:rsync:2.3.2_1.2m68k:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsync:rsync:2.3.2_1.2ppc:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html
- http://rsync.samba.org/security.html#s3_0_0
- http://secunia.com/advisories/27853
- http://secunia.com/advisories/27863
- http://secunia.com/advisories/28412
- http://secunia.com/advisories/28457
- http://secunia.com/advisories/31326
- http://securitytracker.com/id?1019012=
- http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0257
- http://www.mandriva.com/en/security/advisories?name=MDVSA-2008%3A011
- http://www.redhat.com/support/errata/RHSA-2011-0999.html
- http://www.securityfocus.com/archive/1/487991/100/0/threaded
- http://www.securityfocus.com/bid/26639
- http://www.vupen.com/english/advisories/2007/4057
- http://www.vupen.com/english/advisories/2008/2268