Two user-assisted buffer overflow vulnerabilities have been discovered in rsync.
|Package||net-misc/rsync on all architectures|
|Affected versions||< 2.6.9-r3|
|Unaffected versions||>= 2.6.9-r3|
rsync is a file transfer program to keep remote directories synchronized.
Sebastian Krahmer from the SUSE Security Team discovered two off-by-one errors in the function "f_name()" in file sender.c when processing overly long directory names.
A remote attacker could entice a user to synchronize a repository containing specially crafted directories, leading to the execution of arbitrary code with the privileges of the user running the application.
There is no known workaround at this time.
All rsync users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/rsync-2.6.9-r3"
September 20, 2007
September 20, 2007: 01