[SECURITY-L] CAIS-Alerta: Vulnerabilidade no rsync 2.5.6

Security Team - UNICAMP security em unicamp.br
Sex Dez 5 13:40:42 -02 2003


----- Forwarded message from Centro de Atendimento a Incidentes de Seguranca <cais em cais.rnp.br> -----

From: Centro de Atendimento a Incidentes de Seguranca <cais em cais.rnp.br>
Subject: CAIS-Alerta: Vulnerabilidade no rsync 2.5.6
To: rnp-alerta em cais.rnp.br, rnp-seg em cais.rnp.br
Date: Fri, 5 Dec 2003 11:35:56 -0200 (BRDT)

-----BEGIN PGP SIGNED MESSAGE-----


Prezados,

        O CAIS esta repassando o alerta divulgado pelo The rsync team,
"rsync 2.5.6 security advisory", tratando da identificacao de uma
vulnerabilidade no aplicativo rsync que permite a execucao de codigo
arbitrario.

Recentemente, a exploracao da vulnerabilidade do rsync juntamente com a do
kernel do Linux permitiu o comprometimento do servidor rsync.gentoo.org.

Sistemas afetados:

        . Sistemas executando a versao 2.5.6 do rsync e anteriores.


Correcoes disponiveis:

A correcao consiste em fazer a atualizacao para a versao 2.5.7.

        . Rsync 2.5.7
          http://samba.org/ftp/rsync/rsync-2.5.7.tar.gz


Maiores informacoes:

	. http://rsync.samba.org/


Identificador CVE: CAN-2003-0962, (http://cve.mitre.org)


O CAIS recomenda aos administradores manterem seus sistemas e aplicativos
sempre atualizados, de acordo com as ultimas versoes e correcoes
disponibilizadas pelos fabricantes.


Atenciosamente,


################################################################
#   CENTRO DE ATENDIMENTO A INCIDENTES DE SEGURANCA (CAIS)     #
#       Rede Nacional de Ensino e Pesquisa (RNP)               #
#                                                              #
# cais em cais.rnp.br       http://www.cais.rnp.br                #
# Tel. 019-37873300      Fax. 019-37873301                     #
# Chave PGP disponivel   http://www.rnp.br/cais/cais-pgp.key   #
################################################################

- - --------------------------BEGIN INCLUDED TEXT--------------------

rsync 2.5.6 security advisory
- - -----------------------------

December 4th 2003


Background
- - ----------

The rsync team has received evidence that a vulnerability in rsync was
recently used in combination with a Linux kernel vulnerability to
compromise the security of a public rsync server. While the forensic
evidence we have is incomplete, we have pieced together the most
likely way that this attack was conducted and we are releasing this
advisory as a result of our investigations to date.

Our conclusions are that:

 - rsync version 2.5.6 contains a heap overflow vulnerability that can
   be used to remotely run arbitrary code.

 - While this heap overflow vulnerability could not be used by itself
   to obtain root access on a rsync server, it could be used in
   combination with the recently announced brk vulnerability in the
   Linux kernel to produce a full remote compromise.

 - The server that was compromised was using a non-default rsyncd.conf
   option "use chroot = no". The use of this option made the attack on
   the compromised server considerably easier. A successful attack is
   almost certainly still possible without this option, but it would
   be much more difficult.

Please note that this vulnerability only affects the use of rsync as a
"rsync server". To see if you are running a rsync server you should
use the netstat command to see if you are listening on TCP port
873. If you are not listening on TCP port 873 then you are not running
a rsync server.


New rsync release
- - -----------------

In response we have released a new version of rsync, version
2.5.7. This is based on the current stable 2.5.6 release with only the
changes necessary to prevent this heap overflow vulnerability. There
are no new features in this release.

We recommend that anyone running a rsync server take the following
steps:

   1) update to rsync version 2.5.7 immediately

   2) if you are running a Linux kernel prior to version 2.4.23 then
      you should upgrade your kernel immediately. Note that some
      distribution vendors may have patched versions of the 2.4.x
      series kernel that fix the brk vulnerability in versions before
      2.4.23. Check with your vendor security site to ensure that you
      are not vulnerable to the brk problem.

   3) review your /etc/rsyncd.conf configuration file. If you are
      using the option "use chroot = no" then remove that line or
      change it to "use chroot = yes".  If you find that you need that
      option for your rsync service then you should disable your rsync
      service until you have discussed a workaround with the rsync
      maintainers on the rsync mailing list.  The disabling of the
      chroot option should not be needed for any normal rsync server.

The patches and full source for rsync version 2.5.7 are available from
http://rsync.samba.org/ and mirror sites. We expect that vendors will
produce updated packages for their distributions shortly.


Credits
- - -------

The rsync team would like to thank the following individuals for their
assistance in investigating this vulnerability and producing this
response:

   * Timo Sirainen <tss iki.fi>

   * Mike Warfield <mhw wittsend.com>

   * Paul Russell <rusty samba.org>

   * Andrea Barisani <lcars gentoo.org>

Regards,

The rsync team

- - -----------------------------


-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8

iQCVAwUBP9CJxekli63F4U8VAQHo3AP/fErWMsuf6WgIkJZmvFcxZSmoEZ38gnWD
DuCF2FZTIjA5iMD4Y5jrHDAW3t9Hzy1yVyNTtdCDxMkIP8euQZtwLhfKydQbm1nO
Ub4X8VlFeK3fRJkAy8eSAVtJl/YcA2Txq9zfFddrBnIcei8MyWW/lM7nC/IvdJjS
SoWvmaq45pI=
=uMfU
-----END PGP SIGNATURE-----


----- End forwarded message -----



Mais detalhes sobre a lista de discussão SECURITY-L