SB2017122925 - Security restrictions bypass in rsync (Alpine package)
Published: December 29, 2017
Security Bulletin ID
SB2017122925
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Data manipulation
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Security restrictions bypass (CVE-ID: CVE-2017-17434)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to the daemon does not check for fnamecmp filenames in the daemon_filter_list data structure (in the recv_files function in receiver.c) and also does not apply the sanitize_paths protection mechanism to pathnames found in "xname follows" strings (in the read_ndx_and_attrs function in rsync.c) and bypass intended access restrictions.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=e5a5f3d6e05bc416eeb58ab97053992bf9d6d157
- https://git.alpinelinux.org/aports/commit/?id=3d85c601d909ddbde9ddf470256ecf88ec7ca3e0
- https://git.alpinelinux.org/aports/commit/?id=1b8745e4facae3c44f4f8161efc15edec6444a46
- https://git.alpinelinux.org/aports/commit/?id=2da4f7deec6d7ad76b1577c0aee6f83cdf49fcda
- https://git.alpinelinux.org/aports/commit/?id=80540c1d0ea805c1cff515df8e120ad20dc8a0a2
- https://git.alpinelinux.org/aports/commit/?id=d1a225411de6f24ea2401828f3ad25a1f73c57f5