The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing '\0' character in an xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to the daemon.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://git.samba.org/rsync.git/?p=rsync.git%3Ba=commit%3Bh=47a63d90e71d3e19e0e96052bb8c6b9cb140ecc1 | |
https://bugzilla.samba.org/show_bug.cgi?id=13112 | issue tracking |
https://usn.ubuntu.com/3543-1/ | third party advisory vendor advisory |
https://www.debian.org/security/2017/dsa-4068 | third party advisory vendor advisory |
https://usn.ubuntu.com/3543-2/ | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html | third party advisory mailing list |