View | Details | Raw Unified | Return to bug 224478
Collapse All | Expand All

(-)vuln.xml (+35 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="72fff788-e561-11e7-8097-0800271d4b9c">
62
    <topic>rsync -- multiple vulnerabilities</topic>
63
    <affects>
64
      <package>
65
	<name>rsync</name>
66
	<range><ge>3.1.2</ge><le>3.1.2_7</le></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>Jeriko One reports:</p>
72
	<blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16548">
73
	  <p>The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing '\0' character in an xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to the daemon.</p>
74
	</blockquote>
75
	<blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17433">
76
	  <p>The recv_files function in receiver.c in the daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, proceeds with certain file metadata updates before checking for a filename in the daemon_filter_list data structure, which allows remote attackers to bypass intended access restrictions.</p>
77
	</blockquote>
78
	<blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17434">
79
	  <p>The daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, does not check for fnamecmp filenames in the daemon_filter_list data structure (in the recv_files function in receiver.c) and also does not apply the sanitize_paths protection mechanism to pathnames found in "xname follows" strings (in the read_ndx_and_attrs function in rsync.c), which allows remote attackers to bypass intended access restrictions.</p>
80
	</blockquote>
81
      </body>
82
    </description>
83
    <references>
84
      <url>https://www.debian.org/security/2017/dsa-4068</url>
85
      <cvename>CVE-2017-16548</cvename>
86
      <cvename>CVE-2017-17433</cvename>
87
      <cvename>CVE-2017-17434</cvename>
88
      <freebsdpr>224477</freebsdpr>
89
    </references>
90
    <dates>
91
      <discovery>2017-12-17</discovery>
92
      <entry>2017-12-20</entry>
93
    </dates>
94
  </vuln>
95
61
  <vuln vid="dd644964-e10e-11e7-8097-0800271d4b9c">
96
  <vuln vid="dd644964-e10e-11e7-8097-0800271d4b9c">
62
    <topic>ruby -- Command injection vulnerability in Net::FTP</topic>
97
    <topic>ruby -- Command injection vulnerability in Net::FTP</topic>
63
    <affects>
98
    <affects>

Return to bug 224478