Vulnerability Name:

CVE-2002-0048 (CCN-7993)

Assigned:2002-01-25
Published:2002-01-25
Updated:2016-10-18
Summary:Multiple signedness errors (mixed signed and unsigned numbers) in the I/O functions of rsync 2.4.6, 2.3.2, and other versions allow remote attackers to cause a denial of service and execute arbitrary code in the rsync client or server.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-02:10
rsync port contains remotely exploitable vulnerability

Source: FREEBSD
Type: UNKNOWN
FreeBSD-SA-02:10

Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2002-003.0
Linux - Remote attack on rsync

Source: CCN
Type: Conectiva Linux Announcement CLSA-2002:458
rsync

Source: CCN
Type: BugTraq Mailing List, Sun Jan 27 2002 - 03:45:41 CST
rsync-2.5.2 has security fix (was: Re: [RHSA-2002:018-05] New rsync packages available)

Source: CCN
Type: EnGarde Secure Linux Security Advisory ESA-20020125-004
rsync signed integer handling vulnerability

Source: MITRE
Type: CNA
CVE-2002-0048

Source: CONECTIVA
Type: UNKNOWN
CLA-2002:458

Source: SUSE
Type: Patch, Vendor Advisory
SuSE-SA:2002:004

Source: BUGTRAQ
Type: UNKNOWN
20020128 TSLSA-2002-0025 - rsync

Source: BUGTRAQ
Type: UNKNOWN
20020127 rsync-2.5.2 has security fix (was: Re: [RHSA-2002:018-05] New rsync packages available)

Source: HP
Type: UNKNOWN
HPSBTL0201-022

Source: CCN
Type: RHSA-2002-018
New rsync packages available

Source: CCN
Type: rsync Web site
rsync

Source: CALDERA
Type: UNKNOWN
CSSA-2002-003.0

Source: CCN
Type: CIAC Information Bulletin M-035
Red Hat Linux "rsync" Vulnerability

Source: DEBIAN
Type: Patch
DSA-106

Source: DEBIAN
Type: DSA-106
rsync -- remote exploit

Source: XF
Type: UNKNOWN
linux-rsync-root-access(7993)

Source: CCN
Type: US-CERT VU#800635
rsync fails to properly handle negative values specified for signed integers thereby allowing remote command execution

Source: CERT-VN
Type: US Government Resource
VU#800635

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2002:009

Source: ENGARDE
Type: UNKNOWN
ESA-20020125-004

Source: CCN
Type: OSVDB ID: 10021
rsync I/O Functions Multiple Signedness Error Remote Command Execution

Source: REDHAT
Type: UNKNOWN
RHSA-2002:018

Source: BID
Type: Patch, Vendor Advisory
3958

Source: CCN
Type: BID-3958
rsync Signed Array Index Remote Code Execution Vulnerability

Source: CCN
Type: Trustix Secure Linux Security Advisory #2002-0025
rsync

Source: XF
Type: UNKNOWN
linux-rsync-root-access(7993)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:andrew_tridgell:rsync:2.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.3.2_1.2:*:alpha:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.3.2_1.2:*:arm:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.3.2_1.2:*:intel:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.3.2_1.2:*:m68k:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.3.2_1.2:*:ppc:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.3.2_1.2:*:sparc:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.4.4:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.4.6:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.5.0_1:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.5.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:6.4:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:ports_collection:*:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_community:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.01:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:prg_graficos:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:ecommerce:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:5.1:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_single_network_firewall:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:106
    V
    remote exploit
    2002-01-26
    BACK
    andrew_tridgell rsync 2.3.1
    andrew_tridgell rsync 2.3.2
    andrew_tridgell rsync 2.3.2_1.2
    andrew_tridgell rsync 2.3.2_1.2
    andrew_tridgell rsync 2.3.2_1.2
    andrew_tridgell rsync 2.3.2_1.2
    andrew_tridgell rsync 2.3.2_1.2
    andrew_tridgell rsync 2.3.2_1.2
    andrew_tridgell rsync 2.4.1
    andrew_tridgell rsync 2.4.3
    andrew_tridgell rsync 2.4.4
    andrew_tridgell rsync 2.4.6
    andrew_tridgell rsync 2.5.0_1
    andrew_tridgell rsync 2.5.1
    redhat linux 6.2
    suse suse linux 6.4
    debian debian linux 2.2
    mandrakesoft mandrake linux 7.1
    freebsd ports collection *
    trustix secure linux 1.1
    redhat linux 7
    mandrakesoft mandrake linux 7.2
    suse suse linux 7.0
    conectiva linux 6.0
    mandrakesoft mandrake linux corporate server 1.0.1
    suse suse linux 7.1
    engardelinux secure community 1.0.1
    redhat linux 7.1
    trustix secure linux 1.01
    trustix secure linux 1.2
    mandrakesoft mandrake linux 8.0
    conectiva linux 5.0
    conectiva linux prg_graficos
    conectiva linux ecommerce
    conectiva linux 5.1
    mandrakesoft mandrake single network firewall 7.2
    suse suse linux 7.2
    conectiva linux 7.0
    trustix secure linux 1.5
    mandrakesoft mandrake linux 8.1
    redhat linux 7.2
    suse suse linux 7.3
    redhat linux 7.3