Denial of Service (DoS) Affecting rsync package, versions [,2.6.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Denial of Service (DoS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-RSYNC-2370548
  • published26 Jan 2022
  • disclosed9 Feb 2004
  • creditUnknown

Introduced: 9 Feb 2004

CVE-2004-2093  (opens in a new tab)
CWE-400  (opens in a new tab)

How to fix?

Upgrade rsync to version 2.6.0 or higher.

Overview

Affected versions of this package are vulnerable to Denial of Service (DoS). Buffer overflow in the open_socket_out function in socket.c for rsync 2.5.7 and earlier allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long RSYNC_PROXY environment variable. NOTE: since rsync is not setuid, this issue does not provide any additional privileges beyond those that are already available to the user. Therefore this issue may be REJECTED in the future.

CVSS Scores

version 3.1