Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Mandrake: rsync heap overflow vulnerability Print E-mail
User Rating:      How can I rate this item?
Posted by Team   
Mandrake A vulnerability was discovered in all versions of rsync prior to 2.5.7 that was recently used in conjunction with the Linux kernel do_brk() vulnerability to compromise a public rsync server.

Hash: SHA1


                Mandrake Linux Security Update Advisory

 Package name:           rsync
 Advisory ID:            MDKSA-2003:111
 Date:                   December 4th, 2003

 Affected versions:	 9.0, 9.1, 9.2, Corporate Server 2.1,
			 Multi Network Firewall 8.2

 Problem Description:

 A vulnerability was discovered in all versions of rsync prior to 2.5.7
 that was recently used in conjunction with the Linux kernel do_brk()
 vulnerability to compromise a public rsync server.
 This heap overflow vulnerability, by itself, cannot yield root access,
 however it does allow arbitrary code execution on the host running
 rsync as a server.  Also note that this only affects hosts running
 rsync in server mode (listening on port 873, typically under xinetd).


 Updated Packages:
 Corporate Server 2.1:
 9bc8cc0d702a6b443f4e9317c8821b1f  corporate/2.1/RPMS/rsync-2.5.5-5.1.C21mdk.i586.rpm
 01b24d9543fd1048c2b60b7540df5855  corporate/2.1/SRPMS/rsync-2.5.5-5.1.C21mdk.src.rpm

 Corporate Server 2.1/x86_64:
 77aaea222c1ae12fd94e44bd2ccdd13e  x86_64/corporate/2.1/RPMS/rsync-2.5.5-5.1.C21mdk.x86_64.rpm
 01b24d9543fd1048c2b60b7540df5855  x86_64/corporate/2.1/SRPMS/rsync-2.5.5-5.1.C21mdk.src.rpm

 Mandrake Linux 9.0:
 176a59edc02391381bd8c65ba9c535b2  9.0/RPMS/rsync-2.5.5-5.1.90mdk.i586.rpm
 33c6c7dd1a9057d859028c748601f223  9.0/SRPMS/rsync-2.5.5-5.1.90mdk.src.rpm

 Mandrake Linux 9.1:
 f62e360a268f5d258a7116127d89c322  9.1/RPMS/rsync-2.5.7-0.1.91mdk.i586.rpm
 8a1ff0d2ba41c0e12f0e3e434c34d2c2  9.1/SRPMS/rsync-2.5.7-0.1.91mdk.src.rpm

 Mandrake Linux 9.1/PPC:
 0fe2b91fba74687f9cff0db22706f330  ppc/9.1/RPMS/rsync-2.5.7-0.1.91mdk.ppc.rpm
 8a1ff0d2ba41c0e12f0e3e434c34d2c2  ppc/9.1/SRPMS/rsync-2.5.7-0.1.91mdk.src.rpm

 Mandrake Linux 9.2:
 41edd9f6879a380fde978594915e520c  9.2/RPMS/rsync-2.5.7-0.1.92mdk.i586.rpm
 54cd027ef28c50ba918971a588d6506b  9.2/SRPMS/rsync-2.5.7-0.1.92mdk.src.rpm

 Multi Network Firewall 8.2:
 bc447c3f0e1ad99e80c65caa4ac22ee4  mnf8.2/RPMS/rsync-2.5.4-2.1.M82mdk.i586.rpm
 5ec35ae267cc5b3026b269e1d76171b6  mnf8.2/SRPMS/rsync-2.5.4-2.1.M82mdk.src.rpm

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 A list of FTP mirrors can be obtained from:

 All packages are signed by MandrakeSoft for security.  You can obtain
 the GPG public key of the Mandrake Linux Security Team by executing:

  gpg --recv-keys --keyserver 0x22458A98

 Please be aware that sometimes it takes the mirrors a few hours to

 You can view other update advisories for Mandrake Linux at:

 MandrakeSoft has several security-related mailing list services that
 anyone can subscribe to.  Information on these lists can be obtained by

 If you want to report vulnerabilities, please contact

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
Version: GnuPG v1.0.7 (GNU/Linux)


< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Tech Companies, Privacy Advocates Call for NSA Reform
Google warns of unauthorized TLS certificates trusted by almost all OSes
How Kevin Mitnick hacked the audience at CeBIT 2015
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.