summaryrefslogtreecommitdiff
blob: 6c3a99f0f010e0cab06a5509574ab8a99cb19b78 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200605-05">
  <title>rsync: Potential integer overflow</title>
  <synopsis>
    An attacker having write access to an rsync module might be able to execute
    arbitrary code on an rsync server.
  </synopsis>
  <product type="ebuild">rsync</product>
  <announced>2006-05-06</announced>
  <revised count="01">2006-05-06</revised>
  <bug>131631</bug>
  <access>remote</access>
  <affected>
    <package name="net-misc/rsync" auto="yes" arch="*">
      <unaffected range="ge">2.6.8</unaffected>
      <vulnerable range="lt">2.6.8</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    rsync is a server and client utility that provides fast
    incremental file transfers. It is used to efficiently synchronize files
    between hosts and is used by emerge to fetch Gentoo's Portage tree.
    </p>
  </background>
  <description>
    <p>
    An integer overflow was found in the receive_xattr function from
    the extended attributes patch (xattr.c) for rsync. The vulnerable
    function is only present when the "acl" USE flag is set.
    </p>
  </description>
  <impact type="high">
    <p>
    A remote attacker with write access to an rsync module could craft
    malicious extended attributes which would trigger the integer overflow,
    potentially resulting in the execution of arbitrary code with the
    rights of the rsync daemon.
    </p>
  </impact>
  <workaround>
    <p>
    Do not provide write access to an rsync module to untrusted
    parties.
    </p>
  </workaround>
  <resolution>
    <p>
    All rsync users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=net-misc/rsync-2.6.8"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2083">CVE-2006-2083</uri>
  </references>
  <metadata tag="requester" timestamp="2006-05-02T15:25:29Z">
    jaervosz
  </metadata>
  <metadata tag="bugReady" timestamp="2006-05-02T16:18:28Z">
    koon
  </metadata>
  <metadata tag="submitter" timestamp="2006-05-04T20:00:28Z">
    koon
  </metadata>
</glsa>