Lucene search

K
gentooGentoo FoundationGLSA-201702-05
HistoryFeb 10, 2017 - 12:00 a.m.

Lsyncd: Remote execution of arbitrary code

2017-02-1000:00:00
Gentoo Foundation
security.gentoo.org
20

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

77.2%

Background

A daemon to synchronize local directories using rsync.

Description

default-rsyncssh.lua in Lsyncd performed insufficient sanitising of filenames.

Impact

An attacker, able to control files processed by Lsyncd, could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All Lsyncd users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-admin/lsyncd-2.1.6"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-admin/lsyncd< 2.1.6UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

77.2%