[arch-security] [ASA-201503-10] librsync: checksum collision
Levente Polyak
anthraxx at archlinux.org
Mon Mar 16 01:19:40 UTC 2015
Arch Linux Security Advisory ASA-201503-10
==========================================
Severity: Medium
Date : 2015-03-16
CVE-ID : CVE-2014-8242
Package : librsync
Type : checksum collision
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
Summary
=======
The package librsync before version 1.0.0-1 is vulnerable to checksum
collision leading to possible file modification or corruption via a
birthday attack.
Resolution
==========
Upgrade to 1.0.0-1.
# pacman -Syu "librsync>=1.0.0-1"
The problem has been fixed upstream in version 1.0.0.
Workaround
==========
None.
Description
===========
librsync previously used a truncated MD4 "strong" check sum to match
blocks. However, MD4 is not cryptographically strong. It's possible that
an attacker who can control the contents of one part of a file could use
it to control other regions of the file, if it's transferred using
librsync/rdiff. For example this might occur in a database, mailbox, or
VM image containing some attacker-controlled data.
To mitigate this issue, signatures will by default be computed with a
256-bit BLAKE2 hash. Old versions of librsync will complain about a bad
magic number when given these signature files.
Impact
======
An attacker is able to take advantage of the weak checksum calculation
by using a birthday attack in order to corrupt or modify files that are
transfered.
References
==========
http://www.openwall.com/lists/oss-security/2014/07/28/1
https://access.redhat.com/security/cve/CVE-2014-8242
https://github.com/librsync/librsync/issues/5
https://bugs.archlinux.org/task/44175
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20150316/30d4fb4e/attachment.asc>
More information about the arch-security
mailing list