Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Gentoo Local Security Checks --> Category: infos

[GLSA-200605-05] rsync: Potential integer overflow Vulnerability Scan


Vulnerability Scan Summary
rsync: Potential integer overflow

Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200605-05
(rsync: Potential integer overflow)


An integer overflow was found in the receive_xattr function from
the extended attributes patch (xattr.c) for rsync. The vulnerable
function is only present when the "acl" USE flag is set.

Impact

A remote attacker with write access to an rsync module could craft
malicious extended attributes which would trigger the integer overflow,
potentially resulting in the execution of arbitrary code with the
rights of the rsync daemon.

Workaround

Do not provide write access to an rsync module to untrusted
parties.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2083


Solution:
All rsync users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/rsync-2.6.8"


Threat Level: High


Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.