7.5
CVSSv2

CVE-2003-0962

Published: 15/12/2003 Updated: 03/05/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in rsync prior to 2.5.7, when running in server mode, allows remote malicious users to execute arbitrary code and possibly escape the chroot jail.

Vulnerable Product Search on Vulmon Subscribe to Product

andrew tridgell rsync 2.4.4

andrew tridgell rsync 2.4.5

andrew tridgell rsync 2.5.5

andrew tridgell rsync 2.5.6

engardelinux secure community 1.0.1

engardelinux secure community 2.0

andrew tridgell rsync 2.4.1

andrew tridgell rsync 2.4.3

andrew tridgell rsync 2.5.2

andrew tridgell rsync 2.5.3

andrew tridgell rsync 2.5.4

redhat rsync 2.5.5-1

redhat rsync 2.5.5-4

andrew tridgell rsync 2.3.1

andrew tridgell rsync 2.4.6

andrew tridgell rsync 2.4.8

redhat rsync 2.4.6-2

redhat rsync 2.4.6-5

engardelinux secure linux 1.1

engardelinux secure linux 1.2

andrew tridgell rsync 2.3.2

andrew tridgell rsync 2.4.0

andrew tridgell rsync 2.5.0

andrew tridgell rsync 2.5.1

redhat rsync 2.5.4-2

engardelinux secure linux 1.5

slackware slackware linux 9.1

slackware slackware linux current

slackware slackware linux 8.1

slackware slackware linux 9.0

Vendor Advisories

The rsync team has received evidence that a vulnerability in all versions of rsync prior to 257, a fast remote file copy program, was recently used in combination with a Linux kernel vulnerability to compromise the security of a public rsync server While this heap overflow vulnerability could not be used by itself to obtain root access on an rsy ...