Synopsis
The remote Debian host is missing one or more security-related updates.
Description
The remote Debian 11 host has a package installed that is affected by multiple vulnerabilities as referenced in the dla-4015 advisory.
- ------------------------------------------------------------------------- Debian LTS Advisory DLA-4015-1 [email protected] https://www.debian.org/lts/security/ Thorsten Alteholz January 14, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : rsync Version : 3.2.3-4+deb11u2 CVE ID : CVE-2024-12085 CVE-2024-12086 CVE-2024-12087 CVE-2024-12088 CVE-2024-12747
Several vulnerabilities were discovered in rsync, a fast, versatile, remote (and local) file-copying tool.
CVE-2024-12085
Simon Scannell, Pedro Gallegos and Jasiel Spelman reported a flaw in the way rsync compares file checksums, allowing a remote attacker to trigger an information leak.
CVE-2024-12086
Simon Scannell, Pedro Gallegos and Jasiel Spelman discovered a flaw which would result in a server leaking contents of an arbitrary file from the client's machine.
CVE-2024-12087
Simon Scannell, Pedro Gallegos and Jasiel Spelman reported a path traversal vulnerability in the rsync daemon affecting the
--inc-recursive option, which could allow a server to write files outside of the client's intended destination directory.
CVE-2024-12088
Simon Scannell, Pedro Gallegos and Jasiel Spelman reported that when using the --safe-links option, rsync fails to properly verify if a symbolic link destination contains another symbolic link with it, resulting in path traversal and arbitrary file write outside of the desired directory.
CVE-2024-12747
Aleksei Gorban loqpa discovered a race condition when handling symbolic links resulting in an information leak which may enable escalation of privileges.
For Debian 11 bullseye, these problems have been fixed in version 3.2.3-4+deb11u2.
We recommend that you upgrade your rsync packages.
For the detailed security status of rsync please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/rsync
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
Tenable has extracted the preceding description block directly from the Debian security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Upgrade the rsync packages.
Plugin Details
File Name: debian_DLA-4015.nasl
Agent: unix
Supported Sensors: Nessus Agent, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:C/A:C
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Vulnerability Information
CPE: cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:rsync
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Ease: No known exploits are available
Patch Publication Date: 1/14/2025
Vulnerability Publication Date: 1/11/2025