Skip to main content

CVE-1999-0473: The rsync command before rsync 2.3.1 may inadvertently change the permissions of the client's workin

Low
VulnerabilityCVE-1999-0473cve-1999-0473
Published: Wed Apr 07 1999 (04/07/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: andrew_tridgell
Product: rsync

Description

The rsync command before rsync 2.3.1 may inadvertently change the permissions of the client's working directory to the permissions of the directory being transferred.

AI-Powered Analysis

AILast updated: 07/01/2025, 18:42:14 UTC

Technical Analysis

CVE-1999-0473 is a vulnerability found in versions of the rsync utility prior to 2.3.1. Rsync is a widely used file synchronization and transfer tool that efficiently copies and synchronizes files between systems. The vulnerability arises because rsync may inadvertently change the permissions of the client's working directory to match the permissions of the directory being transferred. This behavior is unintended and can lead to permission misconfigurations on the client side. Specifically, when rsync copies directories, it may apply the source directory's permissions to the client's current working directory, potentially weakening or altering access controls. This issue does not affect confidentiality or availability directly but impacts integrity by modifying file system permissions unexpectedly. The vulnerability has a CVSS score of 2.1 (low severity), with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no authentication required (Au:N), no confidentiality impact (C:N), partial integrity impact (I:P), and no availability impact (A:N). No known exploits exist in the wild, and no patches are available since the issue was addressed in rsync version 2.3.1 released shortly after the vulnerability was identified. Given the age of the vulnerability (published in 1999) and the availability of fixed versions, modern systems running updated rsync versions are not affected. However, legacy systems or environments using outdated rsync versions may still be vulnerable to unintended permission changes during synchronization operations.

Potential Impact

For European organizations, the impact of this vulnerability is generally low but can still be significant in specific contexts. If legacy systems or embedded devices running outdated rsync versions are used, inadvertent permission changes could lead to unauthorized access or privilege escalation within internal networks. This could compromise the integrity of critical directories, potentially allowing unauthorized users to modify files or escalate privileges. While the vulnerability does not directly expose sensitive data or cause denial of service, the integrity impact could facilitate further attacks if combined with other vulnerabilities or misconfigurations. Organizations with strict compliance requirements around file permissions and access controls (e.g., financial institutions, healthcare providers) should be cautious, as permission misconfigurations could violate regulatory standards. The risk is mitigated if rsync is used in controlled environments with limited user privileges and if systems are regularly updated. Nonetheless, awareness and auditing of rsync usage in legacy environments remain important to prevent inadvertent security lapses.

Mitigation Recommendations

1. Upgrade rsync to version 2.3.1 or later, as this vulnerability was fixed in that release. 2. Audit all systems, especially legacy and embedded devices, to identify any running outdated rsync versions and plan for upgrades or replacements. 3. Implement strict file system permission monitoring and alerting to detect unexpected changes in directory permissions. 4. Limit the use of rsync to trusted users and restrict execution to controlled environments to reduce the risk of accidental or malicious misuse. 5. Use access control mechanisms such as SELinux or AppArmor to enforce directory permissions and prevent unauthorized modifications even if rsync attempts to change them. 6. Document and review synchronization procedures to ensure that permission changes are intentional and understood by administrators. 7. For environments where upgrading rsync is not feasible, consider alternative secure file synchronization tools that provide better permission handling and security controls.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7def5f

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 6:42:14 PM

Last updated: 7/31/2025, 11:42:41 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats