安全研究
安全漏洞
Rsync f_name函数单字节栈缓冲区溢出漏洞
发布日期:2007-08-15
更新日期:2007-08-17
受影响系统:
rsync rsync 2.6.9描述:
BUGTRAQ ID: 25336
CVE(CAN) ID: CVE-2007-4091
rsync是一款对网站进行镜像备份的程序。
rsync在处理超长目录名时存在漏洞,远程攻击者可能利用此漏洞控制用户系统。
rsync的flist.c文件中的f_name()函数没有正确地验证目录名的长度,如果用户受骗加载了恶意目录的话就可能触发单字节栈溢出,导致在用户系统上执行任意指令。
<*来源:Sebastian Krahmer (krahmer@suse.de)
链接:http://c-skills.blogspot.com/2007/08/cve-2007-4091.html
http://secunia.com/advisories/26493/
http://article.gmane.org/gmane.linux.debian.devel.bugs.general/291908
http://www.debian.org/security/2007/dsa-1360
*>
建议:
厂商补丁:
Debian
------
Debian已经为此发布了一个安全公告(DSA-1360-1)以及相应补丁:
DSA-1360-1:New rsync packages fix arbitrary code execution
链接:http://www.debian.org/security/2007/dsa-1360
补丁下载:
Source archives:
http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9.orig.tar.gz
Size/MD5 checksum: 811841 996d8d8831dbca17910094e56dcb5942
http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1.dsc
Size/MD5 checksum: 566 88e831455ff40fb1304f9b24b172b4e8
http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1.diff.gz
Size/MD5 checksum: 50070 acd89cbfb221bff96ca9732332e4ae43
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_alpha.deb
Size/MD5 checksum: 294200 a2ddf8c18592ca6e20fa33663d08dad6
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_amd64.deb
Size/MD5 checksum: 272024 3677f9d2cc84052aca640abdaeec1441
arm architecture (ARM)
http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_arm.deb
Size/MD5 checksum: 266872 188297b61849dc0b14d84efc90f686e3
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_hppa.deb
Size/MD5 checksum: 282476 1acb103997507f90c21fb2dce5b7acd8
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_i386.deb
Size/MD5 checksum: 261328 44920a341f482f28adc30822490d3478
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_ia64.deb
Size/MD5 checksum: 356938 dcbf3146f1e5957ff77485d56ba54443
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_mips.deb
Size/MD5 checksum: 286592 13ce6e1a92a2ef6936f7895afadd2c4f
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_mipsel.deb
Size/MD5 checksum: 287174 fae85198a3dc65d38fe5a9d2d10eb860
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_s390.deb
Size/MD5 checksum: 278758 4d4d7e358e75cead3bc9b627efca35b6
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/r/rsync/rsync_2.6.9-2etch1_sparc.deb
Size/MD5 checksum: 264106 3e645f1c1563c4ed1f449daf3b48a658
补丁安装方法:
1. 手工安装补丁包:
首先,使用下面的命令来下载补丁软件:
# wget url (url是补丁下载链接地址)
然后,使用下面的命令来安装补丁:
# dpkg -i file.deb (file是相应的补丁名)
2. 使用apt-get自动安装补丁包:
首先,使用下面的命令更新内部数据库:
# apt-get update
然后,使用下面的命令安装更新软件包:
# apt-get upgrade
rsync
-----
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://www.suse.de/~krahmer/rsync-2.6.9-fname-obo.diff
浏览次数:3630
严重程度:0(网友投票)
绿盟科技给您安全的保障
