ID CVE-2006-2083
Summary Integer overflow in the receive_xattr function in the extended attributes patch (xattr.c) for rsync before 2.6.8 might allow attackers to execute arbitrary code via crafted extended attributes that trigger a buffer overflow.
References
Vulnerable Configurations
  • cpe:2.3:a:andrew_tridgell:rsync:2.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:andrew_tridgell:rsync:2.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:andrew_tridgell:rsync:2.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:andrew_tridgell:rsync:2.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:andrew_tridgell:rsync:2.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:andrew_tridgell:rsync:2.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:andrew_tridgell:rsync:2.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:andrew_tridgell:rsync:2.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:andrew_tridgell:rsync:2.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:andrew_tridgell:rsync:2.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:andrew_tridgell:rsync:2.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:andrew_tridgell:rsync:2.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:andrew_tridgell:rsync:2.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:andrew_tridgell:rsync:2.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:andrew_tridgell:rsync:2.6.7:*:*:*:*:*:*:*
    cpe:2.3:a:andrew_tridgell:rsync:2.6.7:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 20-07-2017 - 01:31)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 17788
confirm http://samba.anu.edu.au/ftp/rsync/rsync-2.6.8-NEWS
gentoo GLSA-200605-05
secunia
  • 19920
  • 19964
  • 20011
trustix 2006-0024
vupen ADV-2006-1606
xf rsync-xattr-overflow(26208)
statements via4
contributor Mark J Cox
lastmodified 2006-08-30
organization Red Hat
statement Not vulnerable. This issue does not affect the versions of rsync distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
Last major update 20-07-2017 - 01:31
Published 28-04-2006 - 21:02
Last modified 20-07-2017 - 01:31
Back to Top