SB2011033102 - Buffer overflow in Samba Rsync
Published: March 31, 2011 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2011-1097)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
rsync 3.x before 3.0.8, when certain recursion, deletion, and ownership options are used, allows remote rsync servers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via malformed data.
Remediation
Install update from vendor's website.
References
- http://gitweb.samba.org/?p=rsync.git;a=commit;h=83b94efa6b60a3ff5eee4c5f7812c617a90a03f6
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057641.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057736.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057737.html
- http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
- http://lists.samba.org/archive/rsync/2011-January/025988.html
- http://marc.info/?l=bugtraq&m=133226187115472&w=2
- http://rsync.samba.org/ftp/rsync/src/rsync-3.0.8-NEWS
- http://secunia.com/advisories/44071
- http://secunia.com/advisories/44088
- http://securitytracker.com/id?1025256
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:066
- http://www.redhat.com/support/errata/RHSA-2011-0390.html
- http://www.vupen.com/english/advisories/2011/0792
- http://www.vupen.com/english/advisories/2011/0793
- http://www.vupen.com/english/advisories/2011/0873
- http://www.vupen.com/english/advisories/2011/0876
- https://bugzilla.redhat.com/show_bug.cgi?id=675036
- https://bugzilla.samba.org/show_bug.cgi?id=7936