openSUSE Security Update : rsync (openSUSE-2018-34)

critical Nessus Plugin ID 106063

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for rsync fixes the several issues.

These security issues were fixed :

- CVE-2017-17434: The daemon in rsync did not check for fnamecmp filenames in the daemon_filter_list data structure (in the recv_files function in receiver.c) and also did not apply the sanitize_paths protection mechanism to pathnames found in 'xname follows' strings (in the read_ndx_and_attrs function in rsync.c), which allowed remote attackers to bypass intended access restrictions' (bsc#1071460).

- CVE-2017-17433: The recv_files function in receiver.c in the daemon in rsync, proceeded with certain file metadata updates before checking for a filename in the daemon_filter_list data structure, which allowed remote attackers to bypass intended access restrictions (bsc#1071459).

- CVE-2017-16548: The receive_xattr function in xattrs.c in rsync did not check for a trailing '\\0' character in an xattr name, which allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to the daemon (bsc#1066644).

- CVE-2014-9512: Prevent attackers to write to arbitrary files via a symlink attack on a file in the synchronization path (bsc#915410).

These non-security issues were fixed :

- Stop file upload after errors like a full disk (boo#1062063)

- Ensure -X flag works even when setting owner/group (boo#1028842)

Solution

Update the affected rsync packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1028842

https://bugzilla.opensuse.org/show_bug.cgi?id=1062063

https://bugzilla.opensuse.org/show_bug.cgi?id=1066644

https://bugzilla.opensuse.org/show_bug.cgi?id=1071459

https://bugzilla.opensuse.org/show_bug.cgi?id=1071460

https://bugzilla.opensuse.org/show_bug.cgi?id=915410

https://bugzilla.opensuse.org/show_bug.cgi?id=999847

Plugin Details

Severity: Critical

ID: 106063

File Name: openSUSE-2018-34.nasl

Version: 3.4

Type: local

Agent: unix

Published: 1/16/2018

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:rsync-debugsource, cpe:/o:novell:opensuse:42.2, p-cpe:/a:novell:opensuse:rsync, cpe:/o:novell:opensuse:42.3, p-cpe:/a:novell:opensuse:rsync-debuginfo

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 1/15/2018

Reference Information

CVE: CVE-2014-9512, CVE-2017-16548, CVE-2017-17433, CVE-2017-17434