GLSA Advocate
![Advocate Advocate](/images/ranks/rank-G-1-advocate.gif)
Joined: 12 May 2004 Posts: 2663
|
Posted: Thu Sep 20, 2007 9:26 pm Post subject: [ GLSA 200709-13 ] rsync: Two buffer overflows |
|
|
Gentoo Linux Security Advisory
Title: rsync: Two buffer overflows (GLSA 200709-13)
Severity: normal
Exploitable: remote
Date: September 20, 2007
Bug(s): #189132
ID: 200709-13
Synopsis
Two user-assisted buffer overflow vulnerabilities have been discovered in
rsync.
Background
rsync is a file transfer program to keep remote directories
synchronized.
Affected Packages
Package: net-misc/rsync
Vulnerable: < 2.6.9-r3
Unaffected: >= 2.6.9-r3
Architectures: All supported architectures
Description
Sebastian Krahmer from the SUSE Security Team discovered two off-by-one
errors in the function "f_name()" in file sender.c when processing
overly long directory names.
Impact
A remote attacker could entice a user to synchronize a repository
containing specially crafted directories, leading to the execution of
arbitrary code with the privileges of the user running the application.
Workaround
There is no known workaround at this time.
Resolution
All rsync users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/rsync-2.6.9-r3" |
References
CVE-2007-4091
Last edited by GLSA on Fri Mar 26, 2010 4:25 am; edited 2 times in total |
|