First published: Fri Dec 05 2014(Updated: )
default-rsyncssh.lua in Lsyncd 2.1.5 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a filename.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian | =7.0 | |
Fedora | =19 | |
Fedora | =20 | |
Lsyncd | <=2.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8990 is considered to be of high severity due to its potential for remote command execution.
To fix CVE-2014-8990, upgrade Lsyncd to version 2.1.6 or later where this vulnerability is addressed.
CVE-2014-8990 affects Lsyncd versions 2.1.5 and earlier, and it also impacts Debian Linux 7.0 and Fedora versions 19 and 20.
Yes, CVE-2014-8990 can be exploited remotely by attackers manipulating filenames to execute arbitrary commands.
A potential workaround for CVE-2014-8990 is to restrict access to the affected Lsyncd service to trusted users until a patch can be applied.