Short Name |
RSYNC:EXCLUDE-OF |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
RSYNC |
Keywords |
Linux rsync recv_exclude_list() Buffer Overflow |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against rsync for Linux. rsync 2.5.1 for Linux and earlier versions are vulnerable. Attackers can send a maliciously crafted buffer to the rsync server and execute arbitrary code on the host.
A vulnerability exists within some versions of rsync. Under some circumstances, a remotely supplied signed value is used as an array index, allowing NULL bytes to be written to arbitrary memory locations. Exploitation of this vulnerability could lead to the corruption of the stack, and possibly to execution of arbitrary code as the root user. It is possible that other versions of rsync share this vulnerability.