Heap-based buffer overflow in rsync prior to 2.5.7, when running in server mode, allows remote malicious users to execute arbitrary code and possibly escape the chroot jail.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
redhat rsync 2.4.6-2 |
||
andrew tridgell rsync 2.5.1 |
||
engardelinux secure community 1.0.1 |
||
redhat rsync 2.5.5-1 |
||
andrew tridgell rsync 2.5.5 |
||
redhat rsync 2.4.6-5 |
||
engardelinux secure linux 1.2 |
||
engardelinux secure linux 1.1 |
||
andrew tridgell rsync 2.3.1 |
||
andrew tridgell rsync 2.5.2 |
||
andrew tridgell rsync 2.4.0 |
||
redhat rsync 2.5.4-2 |
||
andrew tridgell rsync 2.4.6 |
||
andrew tridgell rsync 2.4.8 |
||
redhat rsync 2.5.5-4 |
||
andrew tridgell rsync 2.5.4 |
||
andrew tridgell rsync 2.4.5 |
||
engardelinux secure community 2.0 |
||
andrew tridgell rsync 2.5.3 |
||
andrew tridgell rsync 2.3.2 |
||
engardelinux secure linux 1.5 |
||
andrew tridgell rsync 2.4.4 |
||
andrew tridgell rsync 2.5.6 |
||
andrew tridgell rsync 2.5.0 |
||
andrew tridgell rsync 2.4.3 |
||
andrew tridgell rsync 2.4.1 |
||
slackware slackware linux 9.0 |
||
slackware slackware linux 8.1 |
||
slackware slackware linux 9.1 |
||
slackware slackware linux current |