安全研究

安全漏洞
Rsync f_name函数单字节栈缓冲区溢出漏洞

发布日期:2007-08-15
更新日期:2007-08-17

受影响系统:
rsync rsync 2.6.9
描述:
BUGTRAQ  ID: 25336
CVE(CAN) ID: CVE-2007-4091

rsync是一款对网站进行镜像备份的程序。

rsync在处理超长目录名时存在漏洞,远程攻击者可能利用此漏洞控制用户系统。

rsync的flist.c文件中的f_name()函数没有正确地验证目录名的长度,如果用户受骗加载了恶意目录的话就可能触发单字节栈溢出,导致在用户系统上执行任意指令。

<*来源:Sebastian Krahmer (krahmer@suse.de
  
  链接:http://c-skills.blogspot.com/2007/08/cve-2007-4091.html
        http://secunia.com/advisories/26493/
        http://article.gmane.org/gmane.linux.debian.devel.bugs.general/291908
        http://www.debian.org/security/2007/dsa-1360
*>

建议:
厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-1360-1)以及相应补丁:
DSA-1360-1:New rsync packages fix arbitrary code execution
链接:http://www.debian.org/security/2007/dsa-1360

补丁下载:
Source archives:

http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9.orig.tar.gz
Size/MD5 checksum:   811841 996d8d8831dbca17910094e56dcb5942
http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1.dsc
Size/MD5 checksum:      566 88e831455ff40fb1304f9b24b172b4e8
http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1.diff.gz
Size/MD5 checksum:    50070 acd89cbfb221bff96ca9732332e4ae43

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_alpha.deb
Size/MD5 checksum:   294200 a2ddf8c18592ca6e20fa33663d08dad6

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_amd64.deb
Size/MD5 checksum:   272024 3677f9d2cc84052aca640abdaeec1441

arm architecture (ARM)

http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_arm.deb
Size/MD5 checksum:   266872 188297b61849dc0b14d84efc90f686e3

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_hppa.deb
Size/MD5 checksum:   282476 1acb103997507f90c21fb2dce5b7acd8

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_i386.deb
Size/MD5 checksum:   261328 44920a341f482f28adc30822490d3478

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_ia64.deb
Size/MD5 checksum:   356938 dcbf3146f1e5957ff77485d56ba54443

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_mips.deb
Size/MD5 checksum:   286592 13ce6e1a92a2ef6936f7895afadd2c4f

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_mipsel.deb
Size/MD5 checksum:   287174 fae85198a3dc65d38fe5a9d2d10eb860

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_s390.deb
Size/MD5 checksum:   278758 4d4d7e358e75cead3bc9b627efca35b6

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_sparc.deb
Size/MD5 checksum:   264106 3e645f1c1563c4ed1f449daf3b48a658

补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

rsync
-----
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://www.suse.de/~krahmer/rsync-2.6.9-fname-obo.diff

浏览次数:3630
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障