Integer overflow in the receive_xattr function in the extended attributes patch (xattr.c) for rsync prior to 2.6.8 might allow malicious users to execute arbitrary code via crafted extended attributes that trigger a buffer overflow.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
andrew tridgell rsync 2.6.3 |
||
andrew tridgell rsync 2.6.4 |
||
andrew tridgell rsync 2.6.7 |
||
andrew tridgell rsync 2.6.0 |
||
andrew tridgell rsync 2.6.1 |
||
andrew tridgell rsync 2.6.2 |
||
andrew tridgell rsync 2.6.5 |
||
andrew tridgell rsync 2.6.6 |