GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Sat May 06, 2006 5:26 am Post subject: [ GLSA 200605-05 ] rsync: Potential integer overflow |
|
|
Gentoo Linux Security Advisory
Title: rsync: Potential integer overflow (GLSA 200605-05)
Severity: high
Exploitable: remote
Date: May 06, 2006
Bug(s): #131631
ID: 200605-05
Synopsis
An attacker having write access to an rsync module might be able to execute
arbitrary code on an rsync server.
Background
rsync is a server and client utility that provides fast
incremental file transfers. It is used to efficiently synchronize files
between hosts and is used by emerge to fetch Gentoo's Portage tree.
Affected Packages
Package: net-misc/rsync
Vulnerable: < 2.6.8
Unaffected: >= 2.6.8
Architectures: All supported architectures
Description
An integer overflow was found in the receive_xattr function from
the extended attributes patch (xattr.c) for rsync. The vulnerable
function is only present when the "acl" USE flag is set.
Impact
A remote attacker with write access to an rsync module could craft
malicious extended attributes which would trigger the integer overflow,
potentially resulting in the execution of arbitrary code with the
rights of the rsync daemon.
Workaround
Do not provide write access to an rsync module to untrusted
parties.
Resolution
All rsync users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/rsync-2.6.8" |
References
CVE-2006-2083
Last edited by GLSA on Wed Jan 30, 2013 4:22 am; edited 3 times in total |
|