4.6
CVSSv2

CVE-2004-2093

Published: 09/02/2004 Updated: 11/07/2017
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
VMScore: 465
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the open_socket_out function in socket.c for rsync 2.5.7 and previous versions allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long RSYNC_PROXY environment variable. NOTE: since rsync is not setuid, this issue does not provide any additional privileges beyond those that are already available to the user. Therefore this issue may be REJECTED in the future.

Vulnerable Product Search on Vulmon Subscribe to Product

Exploits

/* * rsync <= 257 Local Exploit * Saved EIP on stack is overwritten with address of shellcode in memory * Generally rsync is not setuid or setgid so just a local shell is of no use * So i used a portbinding shellcode as a PoC of a different attack vector * RET is calculated dynamically so payload can be changed just by changing shellcode * T ...