[36138] in bugtraq

home help back first fref pref prev next nref lref last post

TSSA-2004-020-ES - rsync

daemon@ATHENA.MIT.EDU (tinysofa Security Team)
Tue Aug 17 03:00:50 2004

Date: Tue, 17 Aug 2004 01:31:47 +1000
From: tinysofa Security Team <security@tinysofa.org>
To: bugtraq@securityfocus.com
Message-ID: <20040816153147.GB9523@tinysofa.org>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="IiVenqGWf+H9Y6IX"
Content-Disposition: inline


--IiVenqGWf+H9Y6IX
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D
                                             _    =20
                         |_ .  _      _  _  (_  _ =20
                         |_ | | ) \/ _) (_) |  (_|=20
                                  /               =20


                       Security Advisory  #2004-020

 Package Name:      rsync
 Summary:           Exposure of System Information
 Advisory ID:       TSSA-2004-020-ES
 Date:              2004-08-16
 Affected Products: tinysofa enterprise server 2.0

 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D

 Description
 -----------

    rsync [0] is a program for synchronizing files over a network.

    A vulnerability [1] has been reported in rsync, which potentially can b=
e=20
    exploited by malicious users to read or write arbitrary files on a=20
    vulnerable system.

    The vulnerability is caused due to an input validation error within the=
=20
    "sanitize_path()" function of the "util.c" file.

    Successful exploitation requires that the rsync daemon isn't running=20
    chrooted.

    The vulnerability affects version 2.6.2 and prior.   =20

 Resolution
 ----------

    The rsync package has been updated to address this vulnerability.

 References
 ----------
  =20
    [0] http://samba.org/rsync/
    [1] http://samba.org/rsync/#security_aug04
=20

 Recommended Action
 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

  We recommend that all systems with these packages installed be upgraded.


 Location
 =3D=3D=3D=3D=3D=3D=3D=3D

  All tinysofa updates are available from
  <URI:http://http.tinysofa.org/pub/tinysofa/updates/>
  <URI:ftp://ftp.tinysofa.org/pub/tinysofa/updates/>


 Automatic Updates
 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

  Users of the APT tool can enjoy having updates automatically
  installed using 'apt-get upgrade'.


 Questions?
 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

  Check out our mailing lists:
  <URI:http://www.tinysofa.org/communicate/>


 Verification
 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

  This advisory is signed with the tinysofa security sign key.
  This key is available from:
  <URI:http://pgp.mit.edu:11371/pks/lookup?op=3Dget&search=3D0xAEDCBB4B>

  All tinysofa packages are signed with the tinysofa stable sign key.
  This key is available from:
  <URI:http://pgp.mit.edu:11371/pks/lookup?op=3Dget&search=3D0x0F1240A2>

  The advisory is available from the tinysofa errata database at
  <URI:http://www.tinysofa.org/support/errata/>
  or directly at
  <URI:http://www.tinysofa.org/support/errata/2004/020.html>


 Updated Packages
 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

  SRPMS
  -----

  606db14378c661b0b5ce1bbb3cd87d52  rsync-2.6.2-2ts.src.rpm

  i386
  ----

  7d8ea97c366ae496d266b168c9c172ca  rsync-2.6.2-2ts.i386.rpm


 --
 tinysofa Security Team <security at tinysofa dot org>

--IiVenqGWf+H9Y6IX
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFBINNh6VF9/q7cu0sRAvDSAJ0UfoOLVKL2Awq7n6v+uyktvWcN8gCeJThG
LVYm6+Z/HumCmx6xCHmP/mY=
=/Lpq
-----END PGP SIGNATURE-----

--IiVenqGWf+H9Y6IX--

home help back first fref pref prev next nref lref last post