GLSA-200605-05 : rsync: Potential integer overflow

This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200605-05
(rsync: Potential integer overflow)

An integer overflow was found in the receive_xattr function from
the extended attributes patch (xattr.c) for rsync. The vulnerable
function is only present when the 'acl' USE flag is set.

Impact :

A remote attacker with write access to an rsync module could craft
malicious extended attributes which would trigger the integer overflow,
potentially resulting in the execution of arbitrary code with the
rights of the rsync daemon.

Workaround :

Do not provide write access to an rsync module to untrusted

See also :

Solution :

All rsync users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-misc/rsync-2.6.8'

Risk factor :

High / CVSS Base Score : 7.5

Family: Gentoo Local Security Checks

Nessus Plugin ID: 21347 (gentoo_GLSA-200605-05.nasl)

Bugtraq ID:

CVE ID: CVE-2006-2083

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now