Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2007-6200
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-01 Dec, 2007 | 06:46
Updated At-15 Oct, 2018 | 21:50

Unspecified vulnerability in rsync before 3.0.0pre6, when running a writable rsync daemon, allows remote attackers to bypass exclude, exclude_from, and filter and read or write hidden files via (1) symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest options.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Slackware
slackware
>>slackware_linux>>8.1
cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*
Slackware
slackware
>>slackware_linux>>9.0
cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
Slackware
slackware
>>slackware_linux>>9.1
cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
Slackware
slackware
>>slackware_linux>>10.0
cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
Slackware
slackware
>>slackware_linux>>10.1
cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*
Slackware
slackware
>>slackware_linux>>10.2
cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*
Slackware
slackware
>>slackware_linux>>11.0
cpe:2.3:o:slackware:slackware_linux:11.0:*:*:*:*:*:*:*
Slackware
slackware
>>slackware_linux>>12.0
cpe:2.3:o:slackware:slackware_linux:12.0:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.3.1
cpe:2.3:a:rsync:rsync:2.3.1:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.3.2
cpe:2.3:a:rsync:rsync:2.3.2:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.3.2_1.2alpha
cpe:2.3:a:rsync:rsync:2.3.2_1.2alpha:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.3.2_1.2arm
cpe:2.3:a:rsync:rsync:2.3.2_1.2arm:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.3.2_1.2intel
cpe:2.3:a:rsync:rsync:2.3.2_1.2intel:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.3.2_1.2m68k
cpe:2.3:a:rsync:rsync:2.3.2_1.2m68k:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.3.2_1.2ppc
cpe:2.3:a:rsync:rsync:2.3.2_1.2ppc:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.3.2_1.2sparc
cpe:2.3:a:rsync:rsync:2.3.2_1.2sparc:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.3.2_1.3
cpe:2.3:a:rsync:rsync:2.3.2_1.3:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.4.0
cpe:2.3:a:rsync:rsync:2.4.0:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.4.1
cpe:2.3:a:rsync:rsync:2.4.1:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.4.3
cpe:2.3:a:rsync:rsync:2.4.3:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.4.4
cpe:2.3:a:rsync:rsync:2.4.4:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.4.5
cpe:2.3:a:rsync:rsync:2.4.5:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.4.6
cpe:2.3:a:rsync:rsync:2.4.6:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.4.8
cpe:2.3:a:rsync:rsync:2.4.8:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.5.0
cpe:2.3:a:rsync:rsync:2.5.0:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.5.1
cpe:2.3:a:rsync:rsync:2.5.1:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.5.2
cpe:2.3:a:rsync:rsync:2.5.2:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.5.3
cpe:2.3:a:rsync:rsync:2.5.3:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.5.4
cpe:2.3:a:rsync:rsync:2.5.4:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.5.5
cpe:2.3:a:rsync:rsync:2.5.5:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.5.6
cpe:2.3:a:rsync:rsync:2.5.6:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.5.7
cpe:2.3:a:rsync:rsync:2.5.7:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.6
cpe:2.3:a:rsync:rsync:2.6:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.6.1
cpe:2.3:a:rsync:rsync:2.6.1:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.6.2
cpe:2.3:a:rsync:rsync:2.6.2:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.6.5
cpe:2.3:a:rsync:rsync:2.6.5:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.6.6
cpe:2.3:a:rsync:rsync:2.6.6:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.6.7
cpe:2.3:a:rsync:rsync:2.6.7:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.6.8
cpe:2.3:a:rsync:rsync:2.6.8:*:*:*:*:*:*:*
rsync
rsync
>>rsync>>2.6.9
cpe:2.3:a:rsync:rsync:2.6.9:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-264Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2007-12-06T00:00:00

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-6200 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.

References
HyperlinkSourceResource
http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.htmlcve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.htmlcve@mitre.org
N/A
http://rsync.samba.org/security.html#s3_0_0cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27853cve@mitre.org
N/A
http://secunia.com/advisories/27863cve@mitre.org
Patch
Vendor Advisory
http://secunia.com/advisories/28412cve@mitre.org
N/A
http://secunia.com/advisories/28457cve@mitre.org
N/A
http://secunia.com/advisories/31326cve@mitre.org
N/A
http://securitytracker.com/id?1019012cve@mitre.org
N/A
http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0257cve@mitre.org
N/A
http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:011cve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2011-0999.htmlcve@mitre.org
N/A
http://www.securityfocus.com/archive/1/487991/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/26639cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2007/4057cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/2268cve@mitre.org
N/A
Change History
0Changes found

Details not found