First published: Wed Dec 10 2003(Updated: )
Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat rsync | =2.4.6-2 | |
andrew tridgell rsync | =2.5.1 | |
EngardeLinux Secure Community | =1.0.1 | |
redhat rsync | =2.5.5-1 | |
andrew tridgell rsync | =2.5.5 | |
redhat rsync | =2.4.6-5 | |
engardelinux secure linux | =1.2 | |
engardelinux secure linux | =1.1 | |
andrew tridgell rsync | =2.3.1 | |
andrew tridgell rsync | =2.4.4 | |
andrew tridgell rsync | =2.4.5 | |
andrew tridgell rsync | =2.5.6 | |
EngardeLinux Secure Community | =2.0 | |
andrew tridgell rsync | =2.4.1 | |
andrew tridgell rsync | =2.4.3 | |
andrew tridgell rsync | =2.5.2 | |
andrew tridgell rsync | =2.5.3 | |
andrew tridgell rsync | =2.5.4 | |
redhat rsync | =2.5.5-4 | |
andrew tridgell rsync | =2.4.6 | |
andrew tridgell rsync | =2.4.8 | |
andrew tridgell rsync | =2.3.2 | |
andrew tridgell rsync | =2.4.0 | |
andrew tridgell rsync | =2.5.0 | |
redhat rsync | =2.4.6-5 | |
redhat rsync | =2.5.4-2 | |
engardelinux secure linux | =1.5 | |
Slackware Linux | =9.0 | |
Slackware Linux | =8.1 | |
Slackware Linux | =9.1 | |
Slackware Linux | =current |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0962 is considered a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2003-0962, upgrade rsync to version 2.5.7 or later.
CVE-2003-0962 affects rsync versions prior to 2.5.7.
Yes, CVE-2003-0962 can potentially allow attackers to escape the chroot jail when exploiting the vulnerability.
Yes, rsync running in server mode is vulnerable to CVE-2003-0962.