CERTA-2003-AVI-206
Vulnerability from certfr_avis - Published: - Updated:None
Description
rsync est un utilitaire qui permet de synchroniser des fichiers entre plusieurs machines.
Une vulnérabilité de type débordement de mémoire présente dans rsync en mode serveur peut être exploitée à distance par un utilisateur mal intentionné afin d'exécuter du code arbitraire sur le serveur vulnérable.
Contournement provisoire
Pour se protéger contre une attaque venant de l'extérieur, il est recommandé de filtrer le port 873/tcp sur les pare-feux.
Solution
Installer la version 2.5.7 de rsync.
Rsync 2.5.6 et versions antérieures.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cTT\u003eRsync\u003c/TT\u003e 2.5.6 et versions ant\u00e9rieures.",
"content": "## Description\n\nrsync est un utilitaire qui permet de synchroniser des fichiers entre\nplusieurs machines.\n\nUne vuln\u00e9rabilit\u00e9 de type d\u00e9bordement de m\u00e9moire pr\u00e9sente dans rsync en\nmode serveur peut \u00eatre exploit\u00e9e \u00e0 distance par un utilisateur mal\nintentionn\u00e9 afin d\u0027ex\u00e9cuter du code arbitraire sur le serveur\nvuln\u00e9rable.\n\n## Contournement provisoire\n\nPour se prot\u00e9ger contre une attaque venant de l\u0027ext\u00e9rieur, il est\nrecommand\u00e9 de filtrer le port 873/tcp sur les pare-feux.\n\n## Solution\n\nInstaller la version 2.5.7 de rsync.\n",
"cves": [],
"links": [
{
"title": "Site de rsync :",
"url": "http://rsync.samba.org"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 GLSA 200312-03 de Gentoo :",
"url": "http://www.securityfocus.com/advisories/6142"
},
{
"title": "Correctifs de s\u00e9curit\u00e9 de Sun pour les produits Sun Cobalt Qube 3, RaQ 4 et RaQ 550 :",
"url": "http://ftp.cobalt.sun.com/pub/packages/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE-SA:2003:50 de SuSE :",
"url": "http://www.suse.com/de/security/2003_50_rsync.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 MDKSA-2003:111 de Mandrake :",
"url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:111"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RHSA-2003:388 de Red Hat :",
"url": "http://rhn.redhat.com/errata/RHSA-2003-388.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 DSA-404 de Debian :",
"url": "http://www.debian.org/security/2003/dsa-404"
},
{
"title": "Correctifs de s\u00e9curit\u00e9 de Sun pour les produits Sun Cobalt RaQ XTR :",
"url": "http://ftp.cobalt.sun.com/pub/packages/raqxtr/eng/RaQXTR-All-Security-1.0.1-16675.pkg"
}
],
"reference": "CERTA-2003-AVI-206",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2003-12-04T00:00:00.000000"
},
{
"description": "Ajout r\u00e9f\u00e9rence CVE et r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 de Mandrake, Debian, SuSE, Red Hat et Gentoo.",
"revision_date": "2003-12-05T00:00:00.000000"
},
{
"description": "Ajout de la r\u00e9f\u00e9rence aux correctifs de s\u00e9curit\u00e9 de Sun pour les Sun Cobalt Qube3, RaQ 4 et RaQ 550.",
"revision_date": "2004-02-17T00:00:00.000000"
},
{
"description": "Ajout de la r\u00e9f\u00e9rence au correctif de Sun pour Sun Cobalt RaQ XTR.",
"revision_date": "2004-03-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9 de rsync",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 rsync du 4 d\u00e9cembre 2003",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…