Date: 05 December 2003
References: ESB-2003.0837 ESB-2003.0838 ESB-2003.0839 ESB-2003.0840
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
===========================================================================
A U S C E R T A L E R T
AL-2003.24 -- AUSCERT ALERT
rsync version 2.5.6 and earlier contain a heap overflow vulnerability
that can be used to remotely run arbitrary code
05 December 2003
===========================================================================
AusCERT Alert Summary
---------------------
Product: rsync 2.5.6 and earlier
Publisher: The rsync team
Operating System: Linux
BSD
UNIX
Impact: Execute Arbitrary Code/Commands
Access Required: Remote
CVE Names: CAN-2003-0962
Ref: ESB-2003.0837
Due to the severity and current exploitation of this vulnerability,
AusCERT is releasing this information as an AusCERT Alert. AusCERT will
continue to monitor this vulnerability and any changes in exploit
activity. AusCERT members will be updated as information becomes
available.
- --------------------------BEGIN INCLUDED TEXT--------------------
rsync 2.5.6 security advisory
- -----------------------------
December 4th 2003
Background
- ----------
The rsync team has received evidence that a vulnerability in rsync was
recently used in combination with a Linux kernel vulnerability to
compromise the security of a public rsync server. While the forensic
evidence we have is incomplete, we have pieced together the most
likely way that this attack was conducted and we are releasing this
advisory as a result of our investigations to date.
Our conclusions are that:
- rsync version 2.5.6 contains a heap overflow vulnerability that can
be used to remotely run arbitrary code.
- While this heap overflow vulnerability could not be used by itself
to obtain root access on a rsync server, it could be used in
combination with the recently announced brk vulnerability in the
Linux kernel to produce a full remote compromise.
- The server that was compromised was using a non-default rsyncd.conf
option "use chroot = no". The use of this option made the attack on
the compromised server considerably easier. A successful attack is
almost certainly still possible without this option, but it would
be much more difficult.
Please note that this vulnerability only affects the use of rsync as a
"rsync server". To see if you are running a rsync server you should
use the netstat command to see if you are listening on TCP port
873. If you are not listening on TCP port 873 then you are not running
a rsync server.
New rsync release
- -----------------
In response we have released a new version of rsync, version
2.5.7. This is based on the current stable 2.5.6 release with only the
changes necessary to prevent this heap overflow vulnerability. There
are no new features in this release.
We recommend that anyone running a rsync server take the following
steps:
1) update to rsync version 2.5.7 immediately
2) if you are running a Linux kernel prior to version 2.4.23 then
you should upgrade your kernel immediately. Note that some
distribution vendors may have patched versions of the 2.4.x
series kernel that fix the brk vulnerability in versions before
2.4.23. Check with your vendor security site to ensure that you
are not vulnerable to the brk problem.
3) review your /etc/rsyncd.conf configuration file. If you are
using the option "use chroot = no" then remove that line or
change it to "use chroot = yes". If you find that you need that
option for your rsync service then you should disable your rsync
service until you have discussed a workaround with the rsync
maintainers on the rsync mailing list. The disabling of the
chroot option should not be needed for any normal rsync server.
The patches and full source for rsync version 2.5.7 are available from
http://rsync.samba.org/ and mirror sites. We expect that vendors will
produce updated packages for their distributions shortly.
Credits
- -------
The rsync team would like to thank the following individuals for their
assistance in investigating this vulnerability and producing this
response:
* Timo Sirainen <tss iki.fi>
* Mike Warfield <mhw wittsend.com>
* Paul Russell <rusty samba.org>
* Andrea Barisani <lcars gentoo.org>
Regards,
The rsync team
- -----------------------------
- --------------------------END INCLUDED TEXT--------------------
This alert is provided as a service to AusCERT's members. As AusCERT did
not write the document quoted above, AusCERT has had no control over its
content. The decision to follow or act on information or advice contained in
this security bulletin is the responsibility of each user or organisation, and
should be considered in accordance with your organisation's site policies and
procedures. AusCERT takes no responsibility for consequences which may arise
from following or acting on information or advice contained in this security
bulletin.
NOTE: This is only the original release of the alert. It may not be
updated when updates to the original are made. If downloading at a later
date, it is recommended that the alert is retrieved directly from the
author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the alert above. If you have any questions or need further information,
please contact them directly.
Previous advisories, alerts and external security bulletins can be
retrieved from:
http://www.auscert.org.au/render.html?cid=1977
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business
hours which are GMT+10:00 (AEST). On call after hours
for member emergencies only.
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBP8/oPih9+71yA2DNAQFP2AP/YfpxfOXB+NVPvzCfZ+RGVY0ueFmuQf/P
+mQrbkMAuybXpUdgfEtUfjzAbjk8nf6fj2HjdR/bVNw0A2+Log0IHO52ikDASHlH
vC6oSF4A5WJYaVAWjlcsu/Yl6HOSrIVOPnxoGaeaOE/RbPeVsu/2mBYOwsubwM7M
k4W3sDULmFY=
=+55w
-----END PGP SIGNATURE-----
|