ASA-201801-21 log original external raw

[ASA-201801-21] rsync: multiple issues
Arch Linux Security Advisory ASA-201801-21 ========================================== Severity: Critical Date : 2018-01-29 CVE-ID : CVE-2017-15994 CVE-2017-16548 CVE-2017-17433 CVE-2017-17434 CVE-2018-5764 Package : rsync Type : multiple issues Remote : Yes Link : https://security.archlinux.org/AVG-542 Summary ======= The package rsync before version 3.1.3pre1-1 is vulnerable to multiple issues including access restriction bypass and denial of service. Resolution ========== Upgrade to 3.1.3pre1-1. # pacman -Syu "rsync>=3.1.3pre1-1" The problems have been fixed upstream in version 3.1.3pre1. Workaround ========== None. Description =========== - CVE-2017-15994 (access restriction bypass) rsync 3.1.3-development before 2017-10-24, as used in the xlucas svfs rsync fork and other products, mishandles archaic checksums, which makes it easier for remote attackers to bypass intended access restrictions. - CVE-2017-16548 (denial of service) The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing '\0' character in an xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to the daemon. - CVE-2017-17433 (access restriction bypass) The recv_files function in receiver.c in the daemon in rsync 3.1.2, and 3.1.3-development before 2017-11-03, proceeds with certain file metadata updates before checking for a filename in the daemon_filter_list data structure, which allows remote attackers to bypass intended access restrictions. - CVE-2017-17434 (access restriction bypass) The daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, does not check for fnamecmp filenames in the daemon_filter_list data structure (in the recv_files function in receiver.c) and also does not apply the sanitize_paths protection mechanism to pathnames found in "xname follows" strings (in the read_ndx_and_attrs function in rsync.c), which allows remote attackers to bypass intended access restrictions. - CVE-2018-5764 (access restriction bypass) The parse_arguments function in options.c in rsyncd in rsync before 3.1.3 does not prevent multiple --protect-args uses, which allows remote attackers to bypass an argument-sanitization protection mechanism. Impact ====== A remote attacker is able to bypass access restrictions or cause a denial of service by sending a maliciously crafted request to rsyncd. References ========== https://bugs.archlinux.org/task/57111 https://git.samba.org/?p=rsync.git;a=blobdiff;f=checksum.c;h=93826944034f5967b7c3b727994d3b54361854b0;hp=8b3883363d64b9a685c13361b2142e7f365259b5;hb=7b8a4ecd6ff9cdf4e5d3850ebf822f1e989255b3;hpb=17b849c97aa24f30d572ac5ea552e8cb5a27e9fe https://git.samba.org/?p=rsync.git;a=blobdiff;f=authenticate.c;h=a106b0f60a8cb88e37080bc5e2a58ce28c66f379;hp=d60ee20b6b53a9351efbdf175f36525ead220de6;hb=9a480deec4d20277d8e20bc55515ef0640ca1e55;hpb=c252546ceeb0925eb8a4061315e3ff0a8c55b48b https://git.samba.org/?p=rsync.git;a=blobdiff;f=checksum.c;h=c119f972525341c2165c4b5bcb42612c8c983333;hp=93826944034f5967b7c3b727994d3b54361854b0;hb=c252546ceeb0925eb8a4061315e3ff0a8c55b48b;hpb=7b8a4ecd6ff9cdf4e5d3850ebf822f1e989255b3 https://git.samba.org/?p=rsync.git;a=commitdiff;h=47a63d90e71d3e19e0e96052bb8c6b9cb140ecc1 https://git.samba.org/?p=rsync.git;a=commitdiff;h=3e06d40029cfdce9d0f73d87cfd4edaf54be9c51 https://git.samba.org/?p=rsync.git;a=commitdiff;h=5509597decdbd7b91994210f700329d8a35e70a1 https://git.samba.org/?p=rsync.git;a=commitdiff;h=70aeb5fddd1b2f8e143276f8d5a085db16c593b9 https://git.samba.org/?p=rsync.git;a=commitdiff;h=7706303828fcde524222babb2833864a4bd09e07 https://security.archlinux.org/CVE-2017-15994 https://security.archlinux.org/CVE-2017-16548 https://security.archlinux.org/CVE-2017-17433 https://security.archlinux.org/CVE-2017-17434 https://security.archlinux.org/CVE-2018-5764