Integer overflow in the receive_xattr function in the extended attributes patch (xattr.c) for rsync before 2.6.8 might allow attackers to execute arbitrary code via crafted extended attributes that trigger a buffer overflow.
2006-04-28T21:02:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | andrew_tridgell | rsync | 2.6.0 | Yes |
Application | andrew_tridgell | rsync | 2.6.1 | Yes |
Application | andrew_tridgell | rsync | 2.6.2 | Yes |
Application | andrew_tridgell | rsync | 2.6.3 | Yes |
Application | andrew_tridgell | rsync | 2.6.4 | Yes |
Application | andrew_tridgell | rsync | 2.6.5 | Yes |
Application | andrew_tridgell | rsync | 2.6.6 | Yes |
Application | andrew_tridgell | rsync | 2.6.7 | Yes |