First published: Mon Feb 18 2002(Updated: )
Multiple signedness errors (mixed signed and unsigned numbers) in the I/O functions of rsync 2.4.6, 2.3.2, and other versions allow remote attackers to cause a denial of service and execute arbitrary code in the rsync client or server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rsync | =2.3.1 | |
Rsync | =2.3.2 | |
Rsync | =2.3.2_1.2 | |
Rsync | =2.3.2_1.2 | |
Rsync | =2.3.2_1.2 | |
Rsync | =2.3.2_1.2 | |
Rsync | =2.3.2_1.2 | |
Rsync | =2.3.2_1.2 | |
Rsync | =2.4.1 | |
Rsync | =2.4.3 | |
Rsync | =2.4.4 | |
Rsync | =2.4.6 | |
Rsync | =2.5.0_1 | |
Rsync | =2.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0048 is considered a serious vulnerability as it allows for denial of service and potential remote code execution.
To fix CVE-2002-0048, upgrade to the latest version of rsync that addresses this vulnerability.
CVE-2002-0048 affects rsync versions 2.4.6, 2.4.4, 2.4.3, 2.4.1, and earlier versions such as 2.3.2 and 2.3.1.
Attackers may exploit CVE-2002-0048 to cause denial of service or execute arbitrary code on affected rsync clients or servers.
Yes, patches have been released in newer versions of rsync to mitigate the risks associated with CVE-2002-0048.