Vigil@nce - rsync: denial of service via check_secret
April 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use an invalid login name, to generate an infinite
loop in the check_secret() function of rsync, in order to trigger
a denial of service.
– Impacted products: Fedora, Ubuntu, Unix (platform)
– Severity: 2/4
– Creation date: 14/04/2014
DESCRIPTION OF THE VULNERABILITY
The rsync product is used to synchronize two directories.
The check_secret() function of the authenticate.c file of the
rsync daemon checks if the user who requests an authentication
exists in the password file ("secrets file"). However, if the user
does not exist, an infinite loop occurs.
An attacker can therefore use an invalid login name, to generate
an infinite loop in the check_secret() function of rsync, in order
to trigger a denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/rsync-denial-of-service-via-check-secret-14588