First published: Mon Feb 09 2004(Updated: )
Buffer overflow in the open_socket_out function in socket.c for rsync 2.5.7 and earlier allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long RSYNC_PROXY environment variable. NOTE: since rsync is not setuid, this issue does not provide any additional privileges beyond those that are already available to the user. Therefore this issue may be REJECTED in the future.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rsync | <=2.5.7 | |
Rsync | <=2.5.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2093 has a moderate severity level as it can lead to denial of service and potential arbitrary code execution.
To fix CVE-2004-2093, upgrade rsync to version 2.5.8 or later.
CVE-2004-2093 affects rsync version 2.5.7 and earlier.
CVE-2004-2093 requires local access to exploit, as it involves the RSYNC_PROXY environment variable.
CVE-2004-2093 can cause your system to crash and may allow an attacker to execute arbitrary code.