Page 4 of 21 results (0.005 seconds)

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 0

rsync before 2.6.1 does not properly sanitize paths when running a read/write daemon without using chroot, which allows remote attackers to write files outside of the module's path. rsync anteriores a 2.6.1 no limpia adecuadamente rutas cuando ejecuta un demonio de lectura y escritura sin usar chroot, lo que permite a atacantes remotos escribir ficheros fuera de la ruta del módulo. • http://marc.info/?l=bugtraq&m=108515912212018&w=2 http://rsync.samba.org http://secunia.com/advisories/11514 http://secunia.com/advisories/11515 http://secunia.com/advisories/11523 http://secunia.com/advisories/11537 http://secunia.com/advisories/11583 http://secunia.com/advisories/11669 http://secunia.com/advisories/11688 http://secunia.com/advisories/11993 http://secunia.com/advisories/12054 http://www.ciac.org/ciac/bulletins/o-134.shtml http://www.ciac.org& •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

Buffer overflow in the open_socket_out function in socket.c for rsync 2.5.7 and earlier allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long RSYNC_PROXY environment variable. NOTE: since rsync is not setuid, this issue does not provide any additional privileges beyond those that are already available to the user. Therefore this issue may be REJECTED in the future. • https://www.exploit-db.com/exploits/152 http://archives.neohapsis.com/archives/vuln-dev/2004-q1/0091.html https://exchange.xforce.ibmcloud.com/vulnerabilities/15108 •

CVSS: 7.5EPSS: 35%CPEs: 31EXPL: 0

Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail. Desbordamiento de búfer en el montón en rsync anteriores a 2.5.7, cuando se ejecuta en modo servidor, permite a atacantes remotos ejecutar código arbitrario y posiblemente escapar del confinamiento chroot. • ftp://patches.sgi.com/support/free/security/advisories/20031202-01-U http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000794 http://marc.info/?l=bugtraq&m=107055681311602&w=2 http://marc.info/?l=bugtraq&m=107055684711629&w=2 http://marc.info/?l=bugtraq&m=107055702911867&w=2 http://marc.info/? •

CVSS: 2.1EPSS: 0%CPEs: 5EXPL: 0

rsync, when running in daemon mode, does not properly call setgroups before dropping privileges, which could provide supplemental group privileges to local users, who could then read certain files that would otherwise be disallowed. rsync no llama adecuadamente a 'setgroups' antes de establecer los permisos, lo cual podría proveer de ciertos privilegios de grupo a usuarios locales, los cuales podrían leer ciertos ficheros que de otro modo les estarían vetados. • http://www.caldera.com/support/security/advisories/CSSA-2002-014.1.txt http://www.iss.net/security_center/static/8463.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-024.php3 http://www.redhat.com/support/errata/RHSA-2002-026.html http://www.securityfocus.com/bid/4285 https://access.redhat.com/security/cve/CVE-2002-0080 https://bugzilla.redhat.com/show_bug.cgi?id=1616738 • CWE-269: Improper Privilege Management •

CVSS: 10.0EPSS: 91%CPEs: 14EXPL: 3

Multiple signedness errors (mixed signed and unsigned numbers) in the I/O functions of rsync 2.4.6, 2.3.2, and other versions allow remote attackers to cause a denial of service and execute arbitrary code in the rsync client or server. Errores de mezclado de números con y sin signo en las funciones I/O de rsync, versiones 2.4.6, 2.3.2 y otras versiones, permite que atacantes remotos provoquen una denegación de servicio y ejecuten código arbitrario en el cliente o servidor rsync. • https://www.exploit-db.com/exploits/398 https://www.exploit-db.com/exploits/399 https://www.exploit-db.com/exploits/21242 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:10.rsync.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000458 http://lists.suse.com/archives/suse-security-announce/2002-Jan/0003.html http://marc.info/?l=bugtraq&m=101223214906963&w=2 http://marc.info/?l=bugtraq&m=101223603321315&w=2 http://online.securityfocus.co •