Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
andrew tridgell rsync vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-2083
Integer overflow in the receive_xattr function in the extended attributes patch (xattr.c) for rsync prior to 2.6.8 might allow malicious users to execute arbitrary code via crafted extended attributes that trigger a buffer overflow.
Andrew Tridgell Rsync 2.6.7
Andrew Tridgell Rsync 2.6.4
Andrew Tridgell Rsync 2.6.5
Andrew Tridgell Rsync 2.6.2
Andrew Tridgell Rsync 2.6.1
Andrew Tridgell Rsync 2.6.6
Andrew Tridgell Rsync 2.6.0
Andrew Tridgell Rsync 2.6.3
NA
CVE-2004-0792
Directory traversal vulnerability in the sanitize_path function in util.c for rsync 2.6.2 and previous versions, when chroot is disabled, allows malicious users to read or write certain files.
Andrew Tridgell Rsync 2.3.2 1.2
Andrew Tridgell Rsync 2.5.1
Andrew Tridgell Rsync 2.5.5
Andrew Tridgell Rsync 2.3.1
Andrew Tridgell Rsync 2.5.2
Andrew Tridgell Rsync 2.4.0
Andrew Tridgell Rsync 2.3.2 1.3
Andrew Tridgell Rsync 2.6.2
Andrew Tridgell Rsync 2.4.6
Andrew Tridgell Rsync 2.4.8
Andrew Tridgell Rsync 2.5.7
Andrew Tridgell Rsync 2.5.4
Andrew Tridgell Rsync 2.4.5
Andrew Tridgell Rsync 2.6.1
Andrew Tridgell Rsync 2.5.3
Andrew Tridgell Rsync 2.3.2
Andrew Tridgell Rsync 2.6
Andrew Tridgell Rsync 2.4.4
Andrew Tridgell Rsync 2.5.6
Andrew Tridgell Rsync 2.5.0
Andrew Tridgell Rsync 2.4.3
Andrew Tridgell Rsync 2.4.1
NA
CVE-2004-0426
rsync prior to 2.6.1 does not properly sanitize paths when running a read/write daemon without using chroot, which allows remote malicious users to write files outside of the module's path.
Andrew Tridgell Rsync
NA
CVE-2003-0962
Heap-based buffer overflow in rsync prior to 2.5.7, when running in server mode, allows remote malicious users to execute arbitrary code and possibly escape the chroot jail.
Redhat Rsync 2.4.6-2
Andrew Tridgell Rsync 2.5.1
Engardelinux Secure Community 1.0.1
Redhat Rsync 2.5.5-1
Andrew Tridgell Rsync 2.5.5
Redhat Rsync 2.4.6-5
Engardelinux Secure Linux 1.2
Engardelinux Secure Linux 1.1
Andrew Tridgell Rsync 2.3.1
Andrew Tridgell Rsync 2.5.2
Andrew Tridgell Rsync 2.4.0
Redhat Rsync 2.5.4-2
Andrew Tridgell Rsync 2.4.6
Andrew Tridgell Rsync 2.4.8
Redhat Rsync 2.5.5-4
Andrew Tridgell Rsync 2.5.4
Andrew Tridgell Rsync 2.4.5
Engardelinux Secure Community 2.0
Andrew Tridgell Rsync 2.5.3
Andrew Tridgell Rsync 2.3.2
Engardelinux Secure Linux 1.5
Andrew Tridgell Rsync 2.4.4
NA
CVE-2002-0048
Multiple signedness errors (mixed signed and unsigned numbers) in the I/O functions of rsync 2.4.6, 2.3.2, and other versions allow remote malicious users to cause a denial of service and execute arbitrary code in the rsync client or server.
Andrew Tridgell Rsync 2.3.2 1.2
Andrew Tridgell Rsync 2.5.1
Andrew Tridgell Rsync 2.3.1
Andrew Tridgell Rsync 2.4.6
Andrew Tridgell Rsync 2.3.2
Andrew Tridgell Rsync 2.5.0 1
Andrew Tridgell Rsync 2.4.4
Andrew Tridgell Rsync 2.4.3
Andrew Tridgell Rsync 2.4.1
3 EDB exploits
NA
CVE-1999-0473
The rsync command before rsync 2.3.1 may inadvertently change the permissions of the client's working directory to the permissions of the directory being transferred.
Andrew Tridgell Rsync
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started