Andrew Tridgell

Rsync

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.51%
  • Published 28.04.2006 21:02:00
  • Last modified 03.04.2025 01:03:51

Integer overflow in the receive_xattr function in the extended attributes patch (xattr.c) for rsync before 2.6.8 might allow attackers to execute arbitrary code via crafted extended attributes that trigger a buffer overflow.

  • EPSS 0.84%
  • Published 20.10.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

Directory traversal vulnerability in the sanitize_path function in util.c for rsync 2.6.2 and earlier, when chroot is disabled, allows attackers to read or write certain files.

  • EPSS 2.43%
  • Published 07.07.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

rsync before 2.6.1 does not properly sanitize paths when running a read/write daemon without using chroot, which allows remote attackers to write files outside of the module's path.

  • EPSS 41.87%
  • Published 15.12.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail.

  • EPSS 69.46%
  • Published 27.02.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

Multiple signedness errors (mixed signed and unsigned numbers) in the I/O functions of rsync 2.4.6, 2.3.2, and other versions allow remote attackers to cause a denial of service and execute arbitrary code in the rsync client or server.

  • EPSS 0.1%
  • Published 07.04.1999 04:00:00
  • Last modified 03.04.2025 01:03:51

The rsync command before rsync 2.3.1 may inadvertently change the permissions of the client's working directory to the permissions of the directory being transferred.