CVE-2007-6200
Published Dec 1, 2007
Last updated 6 years ago
Overview
- Description
- Unspecified vulnerability in rsync before 3.0.0pre6, when running a writable rsync daemon, allows remote attackers to bypass exclude, exclude_from, and filter and read or write hidden files via (1) symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest options.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Vendor comments
- Red HatRed Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-6200 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "57F41B40-75E6-45C8-A5FB-8464C0B2D064" }, { "criteria": "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "300A6A65-05FD-401C-80F6-B5F5B1F056E0" }, { "criteria": "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AA3D53C9-3806-45E6-8AE9-7D41280EF64C" }, { "criteria": "cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D29C5A03-A7C9-4780-BB63-CF1E874D018D" }, { "criteria": "cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B85EF0EE-3E61-4CA3-9F00-610AB2E1CFCF" }, { "criteria": "cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "70440F49-AEE9-41BE-8E1A-43AB657C8E09" }, { "criteria": "cpe:2.3:o:slackware:slackware_linux:11.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "74022B69-6557-4746-9080-24E4DDA44026" }, { "criteria": "cpe:2.3:o:slackware:slackware_linux:12.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2081CB54-130C-4A25-A2EE-42249DD6B3EB" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:rsync:rsync:2.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "393F7E04-2288-45FE-8971-CC1BA036CA95" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60BF457A-B318-475D-950A-9D873C0C667C" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.3.2_1.2alpha:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8CB9C4CB-09D9-4258-846D-D43C0E8E0CEA" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.3.2_1.2arm:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52CA63EE-0911-44AE-9901-FE46FB659D06" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.3.2_1.2intel:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF678D2B-CD03-4A19-90B4-36448E55943E" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.3.2_1.2m68k:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E454C988-08A3-4269-AC6A-2A975D288C56" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.3.2_1.2ppc:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12BB68EF-28DF-4326-84A3-C215005FD3D3" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.3.2_1.2sparc:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41DC890B-3D3D-41DB-8380-5C290B708350" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.3.2_1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C0E3499-E90D-40C6-B85A-6CC2312532C9" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C23042EA-1243-4786-8F76-CDB94E5B909B" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31F7C3A4-88F3-454F-9046-CA169FF12106" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "63756B36-3D03-4C2E-A1B6-AC45B045F94F" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDF2B595-4AF1-471E-ADFD-FF8CB6F27EA8" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC820774-2B62-4B91-BC1A-EF6B81DD63C3" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4329E28A-F133-414B-98E5-F117C1B73711" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE1E7733-4A97-4817-8192-BDAA539AD2F7" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EEB2A38C-5971-4C38-A2A8-7B8FD44C3816" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCD479A6-7E13-41FB-B6D9-4CBA1459083B" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D08AA818-CEF0-4EA8-BF6B-90A4F512E88C" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2AE611E6-4959-4011-A57A-6774F28D58D6" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7DEEFC01-69A5-4760-8052-FB8BA4B125F0" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A19ACD7B-B36E-42D7-B311-69CD4EF047F4" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1AA7F4E9-1ED4-4D2F-A0A2-F8D861AD108C" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D9A038C-C0B8-416D-B103-5E66963065EE" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C1BB055-0489-42F7-9FC7-99EDDA7026DE" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "336FF990-61EE-4F6B-B4BC-D268DADD3D7F" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "408FDC67-6862-4482-9DC4-E18AFFC3F7C0" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65282BE4-26FA-4E16-B1B1-1A4D82E7C6C2" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84537850-6D26-47D3-9888-810B8305BD3A" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AD67864-2BED-42AD-985E-34058C07FEBA" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "382AFB02-339D-45BB-A60D-7C751F943762" }, { "criteria": "cpe:2.3:a:rsync:rsync:2.6.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32A205AF-8E75-4AD8-BE0F-EC6A9296D127" } ], "operator": "OR" } ], "operator": "AND" } ]