First published: Wed Dec 10 2003(Updated: )
Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Rsync | =2.4.6-2 | |
Andrew Tridgell Rsync | =2.5.1 | |
Engardelinux Secure Community | =1.0.1 | |
Redhat Rsync | =2.5.5-1 | |
Andrew Tridgell Rsync | =2.5.5 | |
Redhat Rsync | =2.4.6-5 | |
Engardelinux Secure Linux | =1.2 | |
Engardelinux Secure Linux | =1.1 | |
Andrew Tridgell Rsync | =2.3.1 | |
Andrew Tridgell Rsync | =2.4.4 | |
Andrew Tridgell Rsync | =2.4.5 | |
Andrew Tridgell Rsync | =2.5.6 | |
Engardelinux Secure Community | =2.0 | |
Andrew Tridgell Rsync | =2.4.1 | |
Andrew Tridgell Rsync | =2.4.3 | |
Andrew Tridgell Rsync | =2.5.2 | |
Andrew Tridgell Rsync | =2.5.3 | |
Andrew Tridgell Rsync | =2.5.4 | |
Redhat Rsync | =2.5.5-4 | |
Andrew Tridgell Rsync | =2.4.6 | |
Andrew Tridgell Rsync | =2.4.8 | |
Andrew Tridgell Rsync | =2.3.2 | |
Andrew Tridgell Rsync | =2.4.0 | |
Andrew Tridgell Rsync | =2.5.0 | |
Redhat Rsync | =2.4.6-5 | |
Redhat Rsync | =2.5.4-2 | |
Engardelinux Secure Linux | =1.5 | |
Slackware Slackware Linux | =9.0 | |
Slackware Slackware Linux | =8.1 | |
Slackware Slackware Linux | =9.1 | |
Slackware Slackware Linux | =current |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.