Gentoo Logo

rsync: Potential integer overflow

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200605-05 / rsync
Release Date May 06, 2006
Latest Revision May 06, 2006: 01
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
net-misc/rsync < 2.6.8 >= 2.6.8 All supported architectures

Related bugreports: #131631

Synopsis

An attacker having write access to an rsync module might be able to execute arbitrary code on an rsync server.

2.  Impact Information

Background

rsync is a server and client utility that provides fast incremental file transfers. It is used to efficiently synchronize files between hosts and is used by emerge to fetch Gentoo's Portage tree.

Description

An integer overflow was found in the receive_xattr function from the extended attributes patch (xattr.c) for rsync. The vulnerable function is only present when the "acl" USE flag is set.

Impact

A remote attacker with write access to an rsync module could craft malicious extended attributes which would trigger the integer overflow, potentially resulting in the execution of arbitrary code with the rights of the rsync daemon.

3.  Resolution Information

Workaround

Do not provide write access to an rsync module to untrusted parties.

Resolution

All rsync users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/rsync-2.6.8"

4.  References



Print

Page updated May 06, 2006

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.