Scientific Linux Security Update : rsync on SL6.x i386/x86_64

medium Nessus Plugin ID 61003

Synopsis

The remote Scientific Linux host is missing a security update.

Description

A memory corruption flaw was found in the way the rsync client processed malformed file list data. If an rsync client used the '--recursive' and '--delete' options without the '--owner' option when connecting to a malicious rsync server, the malicious server could cause rsync on the client system to crash or, possibly, execute arbitrary code with the privileges of the user running rsync.
(CVE-2011-1097)

We would like to thank Wayne Davison and Matt McCutchen for reporting this issue.

Solution

Update the affected rsync package.

See Also

http://www.nessus.org/u?ca7f32b8

Plugin Details

Severity: Medium

ID: 61003

File Name: sl_20110329_rsync_on_SL6_x.nasl

Version: 1.5

Type: local

Agent: unix

Published: 8/1/2012

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 3/29/2011

Reference Information

CVE: CVE-2011-1097