Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Mandrake Local Security Checks --> Category: infos

MDKSA-2002:024: rsync Vulnerability Scan

Vulnerability Scan Summary
Check for the version of the rsync package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory MDKSA-2002:024 (rsync).

Ethan Benson discovered a bug in rsync where the supplementary groups that the
rsync daemon runs as (such as root) would not be removed from the server process
after changing to the specified unprivileged uid and gid. This seems only
serious if rsync is called using 'rsync --daemon' from the command line where it
will inherit the group of the user starting the server (usually root). Note
that, by default, Mandrake Linux uses xinetd to handle connections to the rsync
daemon. This was fixed upstream in version 2.5.3, as well as the previously
noted zlib fixes (see MDKSA-2002:023). The authors released 2.5.4 with some
additional zlib fixes, and all users are encouraged to upgrade to this new
version of rsync.

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.