10
CVSSv2

CVE-2002-0048

Published: 27/02/2002 Updated: 18/10/2016
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple signedness errors (mixed signed and unsigned numbers) in the I/O functions of rsync 2.4.6, 2.3.2, and other versions allow remote malicious users to cause a denial of service and execute arbitrary code in the rsync client or server.

Vulnerable Product Search on Vulmon Subscribe to Product

andrew tridgell rsync 2.3.1

andrew tridgell rsync 2.3.2_1.2

andrew tridgell rsync 2.4.1

andrew tridgell rsync 2.3.2

andrew tridgell rsync 2.4.3

andrew tridgell rsync 2.4.4

andrew tridgell rsync 2.4.6

andrew tridgell rsync 2.5.0_1

andrew tridgell rsync 2.5.1

Exploits

/* 7350rsync - rsync <= 251 remote exploit - x86 ver * * current version 255 but bug was silently fixed it appears * so vuln versions still ship, maybe security implemecations * were not recognized * * we can write NULL bites below &line[0] by supplying negative * lengths read_sbuf calls buf[len] = 0 standard NULL byte off * ...
/*** 7350fuqnut - rsync <= 251 remote exploit -- linux/x86 ver *** *** current version 255 but bug was silently fixed it appears *** so vuln versions still ship, maybe security implemecations *** were not recognized *** *** we can write NULL bites below &line[0] by supplying negative *** lengths read_sbuf calls buf[len] = 0 ...
source: wwwsecurityfocuscom/bid/3958/info A vulnerability exists within some versions of rsync Under some circumstances, a remotely supplied signed value is used as an array index, allowing NULL bytes to be written to arbitrary memory locations Exploitation of this vulnerability could lead to the corruption of the stack, and possibly to ...