Debian dsa-5843 : rsync - security update

high Nessus Plugin ID 214097

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 12 host has a package installed that is affected by multiple vulnerabilities as referenced in the dsa-5843 advisory.

- ------------------------------------------------------------------------- Debian Security Advisory DSA-5843-1 [email protected] https://www.debian.org/security/ Salvatore Bonaccorso January 14, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : rsync CVE ID : CVE-2024-12084 CVE-2024-12085 CVE-2024-12086 CVE-2024-12087 CVE-2024-12088 CVE-2024-12747

Several vulnerabilities were discovered in rsync, a fast, versatile, remote (and local) file-copying tool.

CVE-2024-12084

Simon Scannell, Pedro Gallegos and Jasiel Spelman discovered a heap-based buffer overflow vulnerability due to improper handling of attacker-controlled checksum lengths. A remote attacker can take advantage of this flaw for code execution.

CVE-2024-12085

Simon Scannell, Pedro Gallegos and Jasiel Spelman reported a flaw in the way rsync compares file checksums, allowing a remote attacker to trigger an information leak.

CVE-2024-12086

Simon Scannell, Pedro Gallegos and Jasiel Spelman discovered a flaw which would result in a server leaking contents of an arbitrary file from the client's machine.

CVE-2024-12087

Simon Scannell, Pedro Gallegos and Jasiel Spelman reported a path traversal vulnerability in the rsync daemon affecting the
--inc-recursive option, which could allow a server to write files outside of the client's intended destination directory.

CVE-2024-12088

Simon Scannell, Pedro Gallegos and Jasiel Spelman reported that when using the --safe-links option, rsync fails to properly verify if a symbolic link destination contains another symbolic link with it, resulting in path traversal and arbitrary file write outside of the desired directory.

CVE-2024-12747

Aleksei Gorban loqpa discovered a race condition when handling symbolic links resulting in an information leak which may enable escalation of privileges.

For the stable distribution (bookworm), these problems have been fixed in version 3.2.7-1+deb12u1.

We recommend that you upgrade your rsync packages.

For the detailed security status of rsync please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/rsync

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: [email protected]

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the rsync packages.

See Also

https://security-tracker.debian.org/tracker/source-package/rsync

https://security-tracker.debian.org/tracker/CVE-2024-12084

https://security-tracker.debian.org/tracker/CVE-2024-12085

https://security-tracker.debian.org/tracker/CVE-2024-12086

https://security-tracker.debian.org/tracker/CVE-2024-12087

https://security-tracker.debian.org/tracker/CVE-2024-12088

https://security-tracker.debian.org/tracker/CVE-2024-12747

https://packages.debian.org/source/bookworm/rsync

Plugin Details

Severity: High

ID: 214097

File Name: debian_DSA-5843.nasl

Version: 1.1

Type: local

Agent: unix

Published: 1/14/2025

Updated: 1/14/2025

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:C/A:N

CVSS Score Source: CVE-2024-12088

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2024-12085

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:12.0, p-cpe:/a:debian:debian_linux:rsync

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 1/14/2025

Vulnerability Publication Date: 1/14/2025

Reference Information

CVE: CVE-2024-12084, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747