Vulnerability Name:

CVE-2007-6200 (CCN-38815)

Assigned:2007-11-28
Published:2007-11-28
Updated:2018-10-15
Summary:Unspecified vulnerability in rsync before 3.0.0pre6, when running a writable rsync daemon, allows remote attackers to bypass exclude, exclude_from, and filter and read or write hidden files via (1) symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest options.
CVSS v3 Severity:5.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
3.3 Low (CCN CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N)
2.5 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
4.3 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2007-6200

Source: APPLE
Type: UNKNOWN
APPLE-SA-2008-07-31

Source: SUSE
Type: UNKNOWN
SUSE-SR:2008:001

Source: CCN
Type: RHSA-2011-0999
Moderate: rsync security, bug fix, and enhancement update

Source: CCN
Type: rsync Web site
Daemon security fix in 3.0.0pre6 (with a patch for 2.6.9) + one more advisory

Source: CONFIRM
Type: Vendor Advisory
http://rsync.samba.org/security.html#s3_0_0

Source: SECUNIA
Type: UNKNOWN
27853

Source: CCN
Type: SA27863
rsync Two Security Bypass Vulnerabilities

Source: SECUNIA
Type: Patch, Vendor Advisory
27863

Source: SECUNIA
Type: UNKNOWN
28412

Source: SECUNIA
Type: UNKNOWN
28457

Source: CCN
Type: SA31326
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
31326

Source: CCN
Type: SECTRACK ID: 1019012
Rsync Bugs Let Users Bypass Chroot and Exclude/Filter Access Controls

Source: SECTRACK
Type: UNKNOWN
1019012

Source: CCN
Type: Apple Web site
About Security Update 2008-005

Source: CONFIRM
Type: UNKNOWN
http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0257

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:011

Source: CCN
Type: OSVDB ID: 39593
rsync Unspecified Remote Restriction Bypass

Source: REDHAT
Type: UNKNOWN
RHSA-2011:0999

Source: BUGTRAQ
Type: UNKNOWN
20080212 FLEA-2008-0004-1 rsync

Source: BID
Type: UNKNOWN
26639

Source: CCN
Type: BID-26639
Rsync Daemon Excludes Multiple File Access Vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2007-4057

Source: VUPEN
Type: UNKNOWN
ADV-2008-2268

Source: XF
Type: UNKNOWN
rsync-rsyncd-security-bypass(38815)

Source: SUSE
Type: SUSE-SR:2008:001
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:11.0:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:12.0:*:*:*:*:*:*:*
  • AND
  • cpe:/a:rsync:rsync:2.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.3.2_1.2alpha:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.3.2_1.2arm:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.3.2_1.2intel:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.3.2_1.2m68k:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.3.2_1.2ppc:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.3.2_1.2sparc:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.3.2_1.3:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.4.4:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.4.5:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.4.6:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.4.8:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.5.5:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.5.6:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.5.7:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.6:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.6.5:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.6.6:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.6.7:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.6.8:*:*:*:*:*:*:*
  • OR cpe:/a:rsync:rsync:2.6.9:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20076200
    V
    CVE-2007-6200
    2015-11-16
    oval:org.mitre.oval:def:23344
    P
    ELSA-2011:0999: rsync security, bug fix, and enhancement update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:21980
    P
    RHSA-2011:0999: rsync security, bug fix, and enhancement update (Moderate)
    2014-02-24
    oval:com.redhat.rhsa:def:20110999
    P
    RHSA-2011:0999: rsync security, bug fix, and enhancement update (Moderate)
    2011-07-21
    BACK
    slackware slackware linux 8.1
    slackware slackware linux 9.0
    slackware slackware linux 9.1
    slackware slackware linux 10.0
    slackware slackware linux 10.1
    slackware slackware linux 10.2
    slackware slackware linux 11.0
    slackware slackware linux 12.0
    rsync rsync 2.3.1
    rsync rsync 2.3.2
    rsync rsync 2.3.2_1.2alpha
    rsync rsync 2.3.2_1.2arm
    rsync rsync 2.3.2_1.2intel
    rsync rsync 2.3.2_1.2m68k
    rsync rsync 2.3.2_1.2ppc
    rsync rsync 2.3.2_1.2sparc
    rsync rsync 2.3.2_1.3
    rsync rsync 2.4.0
    rsync rsync 2.4.1
    rsync rsync 2.4.3
    rsync rsync 2.4.4
    rsync rsync 2.4.5
    rsync rsync 2.4.6
    rsync rsync 2.4.8
    rsync rsync 2.5.0
    rsync rsync 2.5.1
    rsync rsync 2.5.2
    rsync rsync 2.5.3
    rsync rsync 2.5.4
    rsync rsync 2.5.5
    rsync rsync 2.5.6
    rsync rsync 2.5.7
    rsync rsync 2.6
    rsync rsync 2.6.1
    rsync rsync 2.6.2
    rsync rsync 2.6.5
    rsync rsync 2.6.6
    rsync rsync 2.6.7
    rsync rsync 2.6.8
    rsync rsync 2.6.9