GLSA-200804-16 : rsync: Execution of arbitrary code

This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200804-16
(rsync: Execution of arbitrary code)

Sebastian Krahmer of SUSE reported an integer overflow in the
expand_item_list() function in the file util.c which might lead to a
heap-based buffer overflow when extended attribute (xattr) support is

Impact :

A remote attacker could send a file containing specially crafted
extended attributes to an rsync deamon, or entice a user to sync from
an rsync server containing specially crafted files, possibly leading to
the execution of arbitrary code.
Please note that extended attributes are only enabled when USE='acl' is
enabled, which is the default setting.

Workaround :

Disable extended attributes in the rsync daemon by setting 'refuse
options = xattrs' in the file '/etc/rsyncd.conf' (or append
'xattrs' to an existing 'refuse' statement). When synchronizing to a
server, do not provide the '-X' parameter to rsync. You can also
disable the 'acl' USE flag for rsync and recompile the package.

See also :

Solution :

All rsync users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-misc/rsync-2.6.9-r6'

Risk factor :

High / CVSS Base Score : 7.5

Family: Gentoo Local Security Checks

Nessus Plugin ID: 32009 (gentoo_GLSA-200804-16.nasl)

Bugtraq ID:

CVE ID: CVE-2008-1720

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now