CVE-2004-2093 Affecting rsync package, versions <2.6.1-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.04% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-RSYNC-5694845
  • published9 Feb 2004
  • disclosed9 Feb 2004

Introduced: 9 Feb 2004

CVE-2004-2093  (opens in a new tab)

How to fix?

Upgrade Debian:13 rsync to version 2.6.1-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream rsync package and not the rsync package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

Buffer overflow in the open_socket_out function in socket.c for rsync 2.5.7 and earlier allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long RSYNC_PROXY environment variable. NOTE: since rsync is not setuid, this issue does not provide any additional privileges beyond those that are already available to the user. Therefore this issue may be REJECTED in the future.

CVSS Scores

version 3.1