Family: Mandrake Local Security Checks --> Category: infos
MDKSA-2002:024: rsync Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the rsync package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory MDKSA-2002:024 (rsync).
Ethan Benson discovered a bug in rsync where the supplementary groups that the
rsync daemon runs as (such as root) would not be removed from the server process
after changing to the specified unprivileged uid and gid. This seems only
serious if rsync is called using 'rsync --daemon' from the command line where it
will inherit the group of the user starting the server (usually root). Note
that, by default, Mandrake Linux uses xinetd to handle connections to the rsync
daemon. This was fixed upstream in version 2.5.3, as well as the previously
noted zlib fixes (see MDKSA-2002:023). The authors released 2.5.4 with some
additional zlib fixes, and all users are encouraged to upgrade to this new
version of rsync.
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2002:024
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.