Trustix Secure Linux Information for VU#325603

Integer overflow vulnerability in rsync

Status

Affected

Vendor Statement

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2003-0048


Package name:      rsync
Summary:           remote code execution
Date:              2003-12-04
Affected versions: TSL 1.2, 1.5, 2.0


- --------------------------------------------------------------------------
Package description:
 Rsync uses a quick and reliable algorithm to very quickly bring
 remote and host files into sync.  Rsync is fast because it just
 sends the differences in the files over the network (instead of
 sending the complete files). Rsync is often used as a very powerful
 mirroring process or just as a more capable replacement for the
 rcp command.  A technical report which describes the rsync algorithm
 is included in this package.


Problem description:
 All versions of rsync prior to 2.5.7 contains a heap overflow that can
 be used to exceute arbitary code from remote.
 The Common Vulnerabilites and Exposures project (cve.mitre.org) has
 assigned the name CAN-2003-0962 to this issue.


Action:
 We recommend that all systems with this package installed be upgraded.
 Please note that if you do not need the functionality provided by this
 package, you may want to remove it from your system.



Location:
 All TSL updates are available from
 <URI:http://http.trustix.org/pub/trustix/updates/>
 <URI:ftp://ftp.trustix.org/pub/trustix/updates/>



About Trustix Secure Linux:
 Trustix Secure Linux is a small Linux distribution for servers. With focus
 on security and stability, the system is painlessly kept safe and up to
 date from day one using swup, the automated software updater.



Automatic updates:
 Users of the SWUP tool can enjoy having updates automatically
 installed using 'swup --upgrade'.



Public testing:
 These packages have been available for public testing for some time.
 If you want to contribute by testing the various packages in the
 testing tree, please feel free to share your findings on the
 tsl-discuss mailinglist.
 The testing tree is located at
 <URI:http://tsldev.trustix.org/cloud/>


  You may also use swup for public testing of updates:
 
 site {
     class = 0
     location = "http://tsldev.trustix.org/cloud/rdfs/latest.rdf"
     regexp = ".*"
 }
 


Questions?
 Check out our mailing lists:
 <URI:http://www.trustix.org/support/>



Verification:
 This advisory along with all TSL packages are signed with the TSL sign key.
 This key is available from:
 <URI:http://www.trustix.org/TSL-SIGN-KEY>


  The advisory itself is available from the errata pages at
 <URI:http://www.trustix.org/errata/trustix-1.2/>,
 <URI:http://www.trustix.org/errata/trustix-1.5/> and
 <URI:http://www.trustix.org/errata/trustix-2.0/>
 or directly at
 <URI:http://www.trustix.org/errata/misc/2003/TSL-2003-0048-rsync.asc.txt>



MD5sums of the packages:
- --------------------------------------------------------------------------
ff92f850103caec5566d3037005be1cc  ./1.2/rpms/rsync-2.5.7-1tr.i586.rpm
c96460c2df73f6f28e86676f0087eed7  ./1.2/srpms/rsync-2.5.7-1tr.src.rpm
24f991051c4d7dc7287770a999c91cfe  ./1.5/rpms/rsync-2.5.7-1tr.i586.rpm
c96460c2df73f6f28e86676f0087eed7  ./1.5/srpms/rsync-2.5.7-1tr.src.rpm
d74d3a08933b4d22439bc08cf435cec9  ./2.0/rpms/rsync-2.5.7-1tr.i586.rpm
1547e73b44c4ee2df24f28b67a229666  ./2.0/rpms/rsync-server-2.5.7-1tr.i586.rpm
406331367957dd7f9ddfe56dc8177580  ./2.0/srpms/rsync-2.5.7-1tr.src.rpm
- --------------------------------------------------------------------------



TSL Security Team

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)


iD8DBQE/zwVBi8CEzsK9IksRArM6AKCaystKuJ7umB1LFxzcZGHVMu2VWwCgmJ0L
LWHTlBr0+2jA31dQuVUoOIk=
=huAV
-----END PGP SIGNATURE-----

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.