Other IDs this deficiency may be known by:
|Date Last Modified
Version Specific Information:
|Cucumber 1.0 i686||fixed in rsync-3.1.2-i686-6 |
|Cucumber 1.0 x86_64||fixed in rsync-3.1.2-x86_64-6 |
|Cucumber 1.1 i686
||fixed in rsync-3.1.2-i686-6 |
|Cucumber 1.1 x86_64
||fixed in rsync-3.1.2-x86_64-6 |
=================================== Overview ===================================
The recv_files function in receiver.c in the daemon in rsync 3.1.2, and
3.1.3-development before 2017-11-03, proceeds with certain file metadata updates
before checking for a filename in the daemon_filter_list data structure, which
allows remote attackers to bypass intended access restrictions.
================================= Our Analysis =================================
----- Affected Products -----
Rsync version 3.1.2 that has not had the patch
applied is vulnerable to this vulnerability. This includes rsync as origianlly
packaged in Cucumber Linux 1.0 and 1.1.
At this time, we are unsure whether other versions of Rsync are affected.
----- Scope and Impact of this Vulnerability -----
Allows for remote attackers to bypass access restrictions.
----- Fix for this Vulnerability -----
This vulnerability can be fixed by applying the patch from
================================= Our Solution =================================
We have applied the patch
and rebuilt rsync.