English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 148472 CVE descriptions
and 72306 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 --------------------------------------------------------------------------
   Turbolinux Security Advisory TLSA-2004-20
   http://www.turbolinux.co.jp/security/
                                             security-team@turbolinux.co.jp
 --------------------------------------------------------------------------

 Original released date : 31 Aug 2004
 Last revised           : 31 Aug 2004

 Package : rsync

 Summary : path-sanitizing bug

 More information :
    rsync uses the "rsync algorithm" which provides a very fast method for bringing
    remote files into sync.  It does this by sending just the differences in files
    across a link, without requiring that both sets of files be present at one of
    the ends of the beforehand.
    A vulnerability has been discovered in rsync in the sanitize_path function
    in file util.c which allows attackers to read and/or write certain files when chroot is disabled.

 Impact :
    The remote attackers may be able to read and write the file which cannot be read and write.

 Affected Products :
    - Turbolinux 10 F...
    - Turbolinux 10 Desktop
    - Turbolinux 8 Server
    - Turbolinux 8 Workstation
    - Turbolinux 7 Server
    - Turbolinux 7 Workstation

 Solution :
    Please use the turbopkg (zabom) tool to apply the update. 
 ---------------------------------------------
 [Turbolinux 10 Desktop, Turbolinux 10 F...]
 # zabom -u libpng rsync

 [other]
 # turbopkg
 or
 # zabom update rsync
 ---------------------------------------------


 <Turbolinux 10 Desktop, Turbolinux 10 F...>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/SRPMS/rsync-2.6.2-2.src.rpm
       523642 18fee2909b5fe8fabab481209e7291a1

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/rsync-2.6.2-2.i586.rpm
       158416 b1188af123b121e7d967b9bcaf3cc249

 <Turbolinux 8 Server>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/SRPMS/rsync-2.6.2-2.src.rpm
       523642 3dbafb5ddcf1cf8b4b381abbe78c4270

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/rsync-2.6.2-2.i586.rpm
       155932 72e9e155f8cc3356bd64d2ece2a53e90

 <Turbolinux 8 Workstation>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/SRPMS/rsync-2.6.2-2.src.rpm
       523642 4352d162daeb6dcaa52fa7cd859c1d8a

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/rsync-2.6.2-2.i586.rpm
       155995 87f3eda08a37a1ff477af0d2d43b5945

 <Turbolinux 7 Server>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/SRPMS/rsync-2.6.2-2.src.rpm
       523642 afb8b736d359491027e191a453980e5b

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/rsync-2.6.2-2.i586.rpm
       152228 1961ff32165a00d1d2608db621295ff4

 <Turbolinux 7 Workstation>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/SRPMS/rsync-2.6.2-2.src.rpm
       523642 7ab289b125b4f6f3c29cb1f2e4b0de76

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/rsync-2.6.2-2.i586.rpm
       152243 53cb13bef3427bf8b5adb8e365f46652


 References:

 rsync
   http://samba.anu.edu.au/rsync/

 CVE
   [CAN-2004-0792]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0792


 --------------------------------------------------------------------------
 Revision History
    31 Aug 2004 Initial release
 --------------------------------------------------------------------------

 Copyright(C) 2004 Turbolinux, Inc. All rights reserved. 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQFBNDXlK0LzjOqIJMwRAmgFAJ9xjmb+lSwslTzzJE8MeTq0rD9BawCgoj04
vOW2xkRx2fZjrdDVH/RU0VA=
=tyLi
-----END PGP SIGNATURE-----

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.