First published: Fri Mar 15 2002(Updated: )
rsync, when running in daemon mode, does not properly call setgroups before dropping privileges, which could provide supplemental group privileges to local users, who could then read certain files that would otherwise be disallowed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | <2.5.3 | |
Red Hat Linux | =7.0 | |
Red Hat Linux | =7.2 | |
Red Hat Linux | =6.2 | |
Red Hat Linux | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0080 is considered a moderate severity vulnerability that could allow local users to gain unauthorized access to certain files.
To fix CVE-2002-0080, it is recommended to upgrade rsync to a version later than 2.5.3.
CVE-2002-0080 affects multiple versions of rsync running in daemon mode, particularly those bundled with Red Hat Linux versions 6.2, 7.0, 7.1, and 7.2.
The impact of CVE-2002-0080 could allow local users to exploit supplemental group privileges, potentially leading to unauthorized file access.
Local users on the affected systems can exploit CVE-2002-0080 to read files that are normally restricted.