Integer overflow in the receive_xattr function in the extended attributes patch (xattr.c) for rsync before 2.6.8 might allow attackers to execute arbitrary code via crafted extended attributes that trigger a buffer overflow.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Rsync | Andrew_tridgell | 2.6.0 (including) | 2.6.0 (including) |
Rsync | Andrew_tridgell | 2.6.1 (including) | 2.6.1 (including) |
Rsync | Andrew_tridgell | 2.6.2 (including) | 2.6.2 (including) |
Rsync | Andrew_tridgell | 2.6.3 (including) | 2.6.3 (including) |
Rsync | Andrew_tridgell | 2.6.4 (including) | 2.6.4 (including) |
Rsync | Andrew_tridgell | 2.6.5 (including) | 2.6.5 (including) |
Rsync | Andrew_tridgell | 2.6.6 (including) | 2.6.6 (including) |
Rsync | Andrew_tridgell | 2.6.7 (including) | 2.6.7 (including) |
Rsync | Ubuntu | dapper | * |
Rsync | Ubuntu | devel | * |
Rsync | Ubuntu | edgy | * |
Rsync | Ubuntu | feisty | * |