CVE-2007-6199 (CNNVD-200712-008)
CRITICAL
中文标题:
Rsync Use Chroot选项创建不安全文件漏洞
英文标题:
rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote...
CVSS分数:
9.3
发布时间:
2007-12-01 01:00:00
漏洞类型:
配置错误
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
rsync是澳大利亚软件开发者安德鲁-垂鸠(Andrew Tridgell)和保罗-麦可拉斯(Paul Mackerras)共同研发的一套用于类Unix系统中的数据镜像备份应用程序,它能够同步更新两处计算机的文件与目录,并利用差分编码减少数据传输。 rsync在某种配置情况下以不安全的方式创建文件,本地攻击者可能利用此漏洞提升权限。 如果以‘use chroot = no’选项运行可写的rsync守护程序的话,攻击者就可能通过符号链接诱骗rsync在模块之外创建文件。
英文描述:
rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy.
CWE类型:
CWE-16
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| rsync | rsync | 2.3.1 | - | - |
cpe:2.3:a:rsync:rsync:2.3.1:*:*:*:*:*:*:*
|
| rsync | rsync | 2.3.2 | - | - |
cpe:2.3:a:rsync:rsync:2.3.2:*:*:*:*:*:*:*
|
| rsync | rsync | 2.3.2_1.2alpha | - | - |
cpe:2.3:a:rsync:rsync:2.3.2_1.2alpha:*:*:*:*:*:*:*
|
| rsync | rsync | 2.3.2_1.2arm | - | - |
cpe:2.3:a:rsync:rsync:2.3.2_1.2arm:*:*:*:*:*:*:*
|
| rsync | rsync | 2.3.2_1.2intel | - | - |
cpe:2.3:a:rsync:rsync:2.3.2_1.2intel:*:*:*:*:*:*:*
|
| rsync | rsync | 2.3.2_1.2m68k | - | - |
cpe:2.3:a:rsync:rsync:2.3.2_1.2m68k:*:*:*:*:*:*:*
|
| rsync | rsync | 2.3.2_1.2ppc | - | - |
cpe:2.3:a:rsync:rsync:2.3.2_1.2ppc:*:*:*:*:*:*:*
|
| rsync | rsync | 2.3.2_1.2sparc | - | - |
cpe:2.3:a:rsync:rsync:2.3.2_1.2sparc:*:*:*:*:*:*:*
|
| rsync | rsync | 2.3.2_1.3 | - | - |
cpe:2.3:a:rsync:rsync:2.3.2_1.3:*:*:*:*:*:*:*
|
| rsync | rsync | 2.4.0 | - | - |
cpe:2.3:a:rsync:rsync:2.4.0:*:*:*:*:*:*:*
|
| rsync | rsync | 2.4.1 | - | - |
cpe:2.3:a:rsync:rsync:2.4.1:*:*:*:*:*:*:*
|
| rsync | rsync | 2.4.3 | - | - |
cpe:2.3:a:rsync:rsync:2.4.3:*:*:*:*:*:*:*
|
| rsync | rsync | 2.4.4 | - | - |
cpe:2.3:a:rsync:rsync:2.4.4:*:*:*:*:*:*:*
|
| rsync | rsync | 2.4.5 | - | - |
cpe:2.3:a:rsync:rsync:2.4.5:*:*:*:*:*:*:*
|
| rsync | rsync | 2.4.6 | - | - |
cpe:2.3:a:rsync:rsync:2.4.6:*:*:*:*:*:*:*
|
| rsync | rsync | 2.4.8 | - | - |
cpe:2.3:a:rsync:rsync:2.4.8:*:*:*:*:*:*:*
|
| rsync | rsync | 2.5.0 | - | - |
cpe:2.3:a:rsync:rsync:2.5.0:*:*:*:*:*:*:*
|
| rsync | rsync | 2.5.1 | - | - |
cpe:2.3:a:rsync:rsync:2.5.1:*:*:*:*:*:*:*
|
| rsync | rsync | 2.5.2 | - | - |
cpe:2.3:a:rsync:rsync:2.5.2:*:*:*:*:*:*:*
|
| rsync | rsync | 2.5.3 | - | - |
cpe:2.3:a:rsync:rsync:2.5.3:*:*:*:*:*:*:*
|
| rsync | rsync | 2.5.4 | - | - |
cpe:2.3:a:rsync:rsync:2.5.4:*:*:*:*:*:*:*
|
| rsync | rsync | 2.5.5 | - | - |
cpe:2.3:a:rsync:rsync:2.5.5:*:*:*:*:*:*:*
|
| rsync | rsync | 2.5.6 | - | - |
cpe:2.3:a:rsync:rsync:2.5.6:*:*:*:*:*:*:*
|
| rsync | rsync | 2.5.7 | - | - |
cpe:2.3:a:rsync:rsync:2.5.7:*:*:*:*:*:*:*
|
| rsync | rsync | 2.6 | - | - |
cpe:2.3:a:rsync:rsync:2.6:*:*:*:*:*:*:*
|
| rsync | rsync | 2.6.1 | - | - |
cpe:2.3:a:rsync:rsync:2.6.1:*:*:*:*:*:*:*
|
| rsync | rsync | 2.6.2 | - | - |
cpe:2.3:a:rsync:rsync:2.6.2:*:*:*:*:*:*:*
|
| rsync | rsync | 2.6.5 | - | - |
cpe:2.3:a:rsync:rsync:2.6.5:*:*:*:*:*:*:*
|
| rsync | rsync | 2.6.6 | - | - |
cpe:2.3:a:rsync:rsync:2.6.6:*:*:*:*:*:*:*
|
| rsync | rsync | 2.6.7 | - | - |
cpe:2.3:a:rsync:rsync:2.6.7:*:*:*:*:*:*:*
|
| rsync | rsync | 2.6.8 | - | - |
cpe:2.3:a:rsync:rsync:2.6.8:*:*:*:*:*:*:*
|
| rsync | rsync | 2.6.9 | - | - |
cpe:2.3:a:rsync:rsync:2.6.9:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
28412
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
ADV-2007-4057
vdb-entry
cve.org
访问
cve.org
APPLE-SA-2008-07-31
vendor-advisory
cve.org
访问
cve.org
ADV-2008-2268
vdb-entry
cve.org
访问
cve.org
27853
third-party-advisory
cve.org
访问
cve.org
20080212 FLEA-2008-0004-1 rsync
mailing-list
cve.org
访问
cve.org
27863
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
61005
third-party-advisory
cve.org
访问
cve.org
28457
third-party-advisory
cve.org
访问
cve.org
MDVSA-2008:011
vendor-advisory
cve.org
访问
cve.org
31326
third-party-advisory
cve.org
访问
cve.org
26638
vdb-entry
cve.org
访问
cve.org
1019012
vdb-entry
cve.org
访问
cve.org
SUSE-SR:2008:001
vendor-advisory
cve.org
访问
cve.org
CVSS评分详情
9.3
CRITICAL
CVSS向量:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS版本:
2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2007-12-01 01:00:00
修改时间:
2024-08-07 15:54:27
创建时间:
2025-11-11 15:32:48
更新时间:
2025-11-11 15:49:22
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2007-6199 |
2025-11-11 15:17:57 | 2025-11-11 07:32:48 |
| NVD | nvd_CVE-2007-6199 |
2025-11-11 14:52:13 | 2025-11-11 07:41:34 |
| CNNVD | cnnvd_CNNVD-200712-008 |
2025-11-11 15:08:59 | 2025-11-11 07:49:22 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:49:22
vulnerability_type: 未提取 → 配置错误; cnnvd_id: 未提取 → CNNVD-200712-008; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 配置错误
- cnnvd_id: 未提取 -> CNNVD-200712-008
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:41:34
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 9.3; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 32; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
- cvss_score: 未提取 -> 9.3
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:C/I:C/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 32
- data_sources: ['cve'] -> ['cve', 'nvd']