CVE-1999-0473: The rsync command before rsync 2.3.1 may inadvertently change the permissions of the client's workin
The rsync command before rsync 2.3.1 may inadvertently change the permissions of the client's working directory to the permissions of the directory being transferred.
AI Analysis
Technical Summary
CVE-1999-0473 is a vulnerability found in versions of the rsync utility prior to 2.3.1. Rsync is a widely used file synchronization and transfer tool that efficiently copies and synchronizes files between systems. The vulnerability arises because rsync may inadvertently change the permissions of the client's working directory to match the permissions of the directory being transferred. This behavior is unintended and can lead to permission misconfigurations on the client side. Specifically, when rsync copies directories, it may apply the source directory's permissions to the client's current working directory, potentially weakening or altering access controls. This issue does not affect confidentiality or availability directly but impacts integrity by modifying file system permissions unexpectedly. The vulnerability has a CVSS score of 2.1 (low severity), with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no authentication required (Au:N), no confidentiality impact (C:N), partial integrity impact (I:P), and no availability impact (A:N). No known exploits exist in the wild, and no patches are available since the issue was addressed in rsync version 2.3.1 released shortly after the vulnerability was identified. Given the age of the vulnerability (published in 1999) and the availability of fixed versions, modern systems running updated rsync versions are not affected. However, legacy systems or environments using outdated rsync versions may still be vulnerable to unintended permission changes during synchronization operations.
Potential Impact
For European organizations, the impact of this vulnerability is generally low but can still be significant in specific contexts. If legacy systems or embedded devices running outdated rsync versions are used, inadvertent permission changes could lead to unauthorized access or privilege escalation within internal networks. This could compromise the integrity of critical directories, potentially allowing unauthorized users to modify files or escalate privileges. While the vulnerability does not directly expose sensitive data or cause denial of service, the integrity impact could facilitate further attacks if combined with other vulnerabilities or misconfigurations. Organizations with strict compliance requirements around file permissions and access controls (e.g., financial institutions, healthcare providers) should be cautious, as permission misconfigurations could violate regulatory standards. The risk is mitigated if rsync is used in controlled environments with limited user privileges and if systems are regularly updated. Nonetheless, awareness and auditing of rsync usage in legacy environments remain important to prevent inadvertent security lapses.
Mitigation Recommendations
1. Upgrade rsync to version 2.3.1 or later, as this vulnerability was fixed in that release. 2. Audit all systems, especially legacy and embedded devices, to identify any running outdated rsync versions and plan for upgrades or replacements. 3. Implement strict file system permission monitoring and alerting to detect unexpected changes in directory permissions. 4. Limit the use of rsync to trusted users and restrict execution to controlled environments to reduce the risk of accidental or malicious misuse. 5. Use access control mechanisms such as SELinux or AppArmor to enforce directory permissions and prevent unauthorized modifications even if rsync attempts to change them. 6. Document and review synchronization procedures to ensure that permission changes are intentional and understood by administrators. 7. For environments where upgrading rsync is not feasible, consider alternative secure file synchronization tools that provide better permission handling and security controls.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-1999-0473: The rsync command before rsync 2.3.1 may inadvertently change the permissions of the client's workin
Description
The rsync command before rsync 2.3.1 may inadvertently change the permissions of the client's working directory to the permissions of the directory being transferred.
AI-Powered Analysis
Technical Analysis
CVE-1999-0473 is a vulnerability found in versions of the rsync utility prior to 2.3.1. Rsync is a widely used file synchronization and transfer tool that efficiently copies and synchronizes files between systems. The vulnerability arises because rsync may inadvertently change the permissions of the client's working directory to match the permissions of the directory being transferred. This behavior is unintended and can lead to permission misconfigurations on the client side. Specifically, when rsync copies directories, it may apply the source directory's permissions to the client's current working directory, potentially weakening or altering access controls. This issue does not affect confidentiality or availability directly but impacts integrity by modifying file system permissions unexpectedly. The vulnerability has a CVSS score of 2.1 (low severity), with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no authentication required (Au:N), no confidentiality impact (C:N), partial integrity impact (I:P), and no availability impact (A:N). No known exploits exist in the wild, and no patches are available since the issue was addressed in rsync version 2.3.1 released shortly after the vulnerability was identified. Given the age of the vulnerability (published in 1999) and the availability of fixed versions, modern systems running updated rsync versions are not affected. However, legacy systems or environments using outdated rsync versions may still be vulnerable to unintended permission changes during synchronization operations.
Potential Impact
For European organizations, the impact of this vulnerability is generally low but can still be significant in specific contexts. If legacy systems or embedded devices running outdated rsync versions are used, inadvertent permission changes could lead to unauthorized access or privilege escalation within internal networks. This could compromise the integrity of critical directories, potentially allowing unauthorized users to modify files or escalate privileges. While the vulnerability does not directly expose sensitive data or cause denial of service, the integrity impact could facilitate further attacks if combined with other vulnerabilities or misconfigurations. Organizations with strict compliance requirements around file permissions and access controls (e.g., financial institutions, healthcare providers) should be cautious, as permission misconfigurations could violate regulatory standards. The risk is mitigated if rsync is used in controlled environments with limited user privileges and if systems are regularly updated. Nonetheless, awareness and auditing of rsync usage in legacy environments remain important to prevent inadvertent security lapses.
Mitigation Recommendations
1. Upgrade rsync to version 2.3.1 or later, as this vulnerability was fixed in that release. 2. Audit all systems, especially legacy and embedded devices, to identify any running outdated rsync versions and plan for upgrades or replacements. 3. Implement strict file system permission monitoring and alerting to detect unexpected changes in directory permissions. 4. Limit the use of rsync to trusted users and restrict execution to controlled environments to reduce the risk of accidental or malicious misuse. 5. Use access control mechanisms such as SELinux or AppArmor to enforce directory permissions and prevent unauthorized modifications even if rsync attempts to change them. 6. Document and review synchronization procedures to ensure that permission changes are intentional and understood by administrators. 7. For environments where upgrading rsync is not feasible, consider alternative secure file synchronization tools that provide better permission handling and security controls.
Affected Countries
Threat ID: 682ca32cb6fd31d6ed7def5f
Added to database: 5/20/2025, 3:43:40 PM
Last enriched: 7/1/2025, 6:42:14 PM
Last updated: 2/7/2026, 9:33:37 AM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25764: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opf openproject
LowCVE-2026-25729: CWE-863: Incorrect Authorization in lintsinghua DeepAudit
LowCVE-2025-15320: Multiple Binds to the Same Port in Tanium Tanium Client
LowCVE-2026-25724: CWE-61: UNIX Symbolic Link (Symlink) Following in anthropics claude-code
LowCVE-2026-1337: CWE-117 Improper Output Neutralization for Logs in neo4j Enterprise Edition
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.