RSnapshot Local File Permission Manipulation Vulnerability
BID:13095
Info
RSnapshot Local File Permission Manipulation Vulnerability
| Bugtraq ID: | 13095 |
| Class: | Design Error |
| CVE: |
CVE-2005-1064 |
| Remote: | No |
| Local: | Yes |
| Published: | Apr 11 2005 12:00AM |
| Updated: | Jul 12 2009 12:56PM |
| Credit: | The individual or individuals responsible for the discovery of this issue are currently unknown; the vendor disclosed this issue. |
| Vulnerable: |
rsnapshot filesystem snapshot utility 1.2 rsnapshot filesystem snapshot utility 1.1.6 rsnapshot filesystem snapshot utility 1.1.5 rsnapshot filesystem snapshot utility 1.1.4 rsnapshot filesystem snapshot utility 1.1.3 rsnapshot filesystem snapshot utility 1.1.2 rsnapshot filesystem snapshot utility 1.1.1 rsnapshot filesystem snapshot utility 1.1 rsnapshot filesystem snapshot utility 1.0.10 Gentoo Linux |
| Not Vulnerable: |
rsnapshot filesystem snapshot utility 1.2.1 rsnapshot filesystem snapshot utility 1.1.7 |
Discussion
RSnapshot Local File Permission Manipulation Vulnerability
A local file privileges manipulation vulnerability affects rsnapshot. This issue is due to a design error that causes the failure of the utility to properly assign permissions on files referenced by symbolic link files.
An attacker may leverage this issue to change the permissions on arbitrary files backed up by the affected utility. Specifically an attacker can claim ownership of the target file.
A local file privileges manipulation vulnerability affects rsnapshot. This issue is due to a design error that causes the failure of the utility to properly assign permissions on files referenced by symbolic link files.
An attacker may leverage this issue to change the permissions on arbitrary files backed up by the affected utility. Specifically an attacker can claim ownership of the target file.
Exploit / POC
RSnapshot Local File Permission Manipulation Vulnerability
No exploit is required to leverage this issue.
No exploit is required to leverage this issue.
Solution / Fix
RSnapshot Local File Permission Manipulation Vulnerability
Solution:
The vendor has released upgrades dealing with this issue.
Gentoo has released advisory GLSA 200504-12 to address this issue. Please see the referenced advisory for more information.
rsnapshot filesystem snapshot utility 1.1
rsnapshot filesystem snapshot utility 1.1.1
rsnapshot filesystem snapshot utility 1.1.2
rsnapshot filesystem snapshot utility 1.1.3
rsnapshot filesystem snapshot utility 1.1.4
rsnapshot filesystem snapshot utility 1.1.5
rsnapshot filesystem snapshot utility 1.1.6
rsnapshot filesystem snapshot utility 1.2
Solution:
The vendor has released upgrades dealing with this issue.
Gentoo has released advisory GLSA 200504-12 to address this issue. Please see the referenced advisory for more information.
rsnapshot filesystem snapshot utility 1.1
-
rsnapshot rsnapshot 1.1.7
http://www.rsnapshot.org/downloads/rsnapshot-1.1.7.tar.gz
rsnapshot filesystem snapshot utility 1.1.1
-
rsnapshot rsnapshot 1.1.7
http://www.rsnapshot.org/downloads/rsnapshot-1.1.7.tar.gz
rsnapshot filesystem snapshot utility 1.1.2
-
rsnapshot rsnapshot 1.1.7
http://www.rsnapshot.org/downloads/rsnapshot-1.1.7.tar.gz
rsnapshot filesystem snapshot utility 1.1.3
-
rsnapshot rsnapshot 1.1.7
http://www.rsnapshot.org/downloads/rsnapshot-1.1.7.tar.gz
rsnapshot filesystem snapshot utility 1.1.4
-
rsnapshot rsnapshot 1.1.7
http://www.rsnapshot.org/downloads/rsnapshot-1.1.7.tar.gz
rsnapshot filesystem snapshot utility 1.1.5
-
rsnapshot rsnapshot 1.1.7
http://www.rsnapshot.org/downloads/rsnapshot-1.1.7.tar.gz
rsnapshot filesystem snapshot utility 1.1.6
-
rsnapshot rsnapshot 1.1.7
http://www.rsnapshot.org/downloads/rsnapshot-1.1.7.tar.gz
rsnapshot filesystem snapshot utility 1.2
-
rsnapshot rsnapshot 1.2.1
http://www.rsnapshot.org/downloads/rsnapshot-1.2.1.tar.gz
References
RSnapshot Local File Permission Manipulation Vulnerability
References:
References:
- 001 - chown() follow symlink bug (rsnapshot)
- rsnapshot Home Page (rsnapshot)
- rsnapshot Security Advisory 001 ([email protected])