CVE-2018-10195

7.1 HIGH

📋 TL;DR

This vulnerability in lrzsz (a file transfer tool) allows information leakage to the receiving side due to an integer overflow in the zsdata function. Attackers can exploit this to read unintended memory contents from the sending system. Anyone using vulnerable versions of lrzsz for file transfers is affected.

💻 Affected Systems

Products:
  • lrzsz
Versions: All versions before 0.12.21~rc
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where lrzsz is installed and used for file transfers. Many distributions ship lrzsz but it may not be actively used.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive memory contents (including passwords, keys, or other process data) could be leaked to an attacker-controlled receiving system during file transfers.

🟠

Likely Case

Partial memory disclosure of the sending process, potentially revealing sensitive information or system details that could aid further attacks.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to potential information disclosure within controlled environments.

🌐 Internet-Facing: MEDIUM - lrzsz is typically used for file transfers which may occur over internet connections, but requires specific usage patterns.
🏢 Internal Only: MEDIUM - Internal file transfers using vulnerable versions could leak sensitive data between systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires the attacker to be the receiving side of an lrzsz file transfer session. No public exploit code has been documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.12.21~rc and later

Vendor Advisory: http://www.ohse.de/uwe/software/lrzsz.html

Restart Required: No

Instructions:

1. Update lrzsz package using your distribution's package manager. 2. For Debian/Ubuntu: sudo apt update && sudo apt install lrzsz. 3. For RHEL/CentOS: sudo yum update lrzsz. 4. For source installations: Download and compile version 0.12.21~rc or later from the official site.

🔧 Temporary Workarounds

Disable lrzsz usage

linux

Replace lrzsz with alternative secure file transfer methods like scp, sftp, or rsync over SSH.

# Remove lrzsz package: sudo apt remove lrzsz
# Or: sudo yum remove lrzsz

Network restrictions

linux

Restrict network access to systems using lrzsz to trusted networks only.

# Example iptables rule: sudo iptables -A INPUT -p tcp --dport 115 -s ! trusted_network -j DROP

🧯 If You Can't Patch

  • Replace lrzsz with alternative secure file transfer tools like scp or sftp.
  • Isolate systems using lrzsz to segmented network zones with strict access controls.

🔍 How to Verify

Check if Vulnerable:

Check lrzsz version: lrz --version or check package version with your package manager.

Check Version:

lrz --version 2>/dev/null || sz --version 2>/dev/null || dpkg -l lrzsz 2>/dev/null || rpm -q lrzsz 2>/dev/null

Verify Fix Applied:

Verify installed version is 0.12.21~rc or later: lrz --version | grep -E '0\.12\.21|0\.12\.22|0\.12\.23'

📡 Detection & Monitoring

Log Indicators:

  • Unusual file transfer patterns using lrzsz
  • Multiple failed or abnormal lrzsz sessions

Network Indicators:

  • Port 115 (default lrzsz port) traffic to untrusted destinations
  • Unusual data patterns in lrzsz protocol traffic

SIEM Query:

source_port:115 OR dest_port:115 AND (protocol:lrzsz OR process_name:lrz OR process_name:sz)

🔗 References

📤 Share & Export