Joined: 12 May 2004
|Posted: Thu Sep 20, 2007 9:26 pm Post subject: [ GLSA 200709-13 ] rsync: Two buffer overflows
|Gentoo Linux Security Advisory
Title: rsync: Two buffer overflows (GLSA 200709-13)
Date: September 20, 2007
Two user-assisted buffer overflow vulnerabilities have been discovered in
rsync is a file transfer program to keep remote directories
Vulnerable: < 2.6.9-r3
Unaffected: >= 2.6.9-r3
Architectures: All supported architectures
Sebastian Krahmer from the SUSE Security Team discovered two off-by-one
errors in the function "f_name()" in file sender.c when processing
overly long directory names.
A remote attacker could entice a user to synchronize a repository
containing specially crafted directories, leading to the execution of
arbitrary code with the privileges of the user running the application.
There is no known workaround at this time.
All rsync users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/rsync-2.6.9-r3"
Last edited by GLSA on Fri Mar 26, 2010 4:25 am; edited 2 times in total