GLSA-200804-16 : rsync: Execution of arbitrary code

high Nessus Plugin ID 32009

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200804-16 (rsync: Execution of arbitrary code)

Sebastian Krahmer of SUSE reported an integer overflow in the expand_item_list() function in the file util.c which might lead to a heap-based buffer overflow when extended attribute (xattr) support is enabled.
Impact :

A remote attacker could send a file containing specially crafted extended attributes to an rsync deamon, or entice a user to sync from an rsync server containing specially crafted files, possibly leading to the execution of arbitrary code.
Please note that extended attributes are only enabled when USE='acl' is enabled, which is the default setting.
Workaround :

Disable extended attributes in the rsync daemon by setting 'refuse options = xattrs' in the file '/etc/rsyncd.conf' (or append 'xattrs' to an existing 'refuse' statement). When synchronizing to a server, do not provide the '-X' parameter to rsync. You can also disable the 'acl' USE flag for rsync and recompile the package.

Solution

All rsync users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-misc/rsync-2.6.9-r6'

See Also

https://security.gentoo.org/glsa/200804-16

Plugin Details

Severity: High

ID: 32009

File Name: gentoo_GLSA-200804-16.nasl

Version: 1.14

Type: local

Published: 4/22/2008

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:gentoo:linux, p-cpe:/a:gentoo:linux:rsync

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 4/17/2008

Reference Information

CVE: CVE-2008-1720

CWE: 119

GLSA: 200804-16