Vulnerability Name:

CVE-2003-0962 (CCN-13899)

Assigned:2003-10-04
Published:2003-10-04
Updated:2018-05-03
Summary:Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: SGI
Type: UNKNOWN
20031202-01-U

Source: CCN
Type: SGI Security Advisory 20031202-01-U
SGI Advanced Linux Environment security update #6

Source: MITRE
Type: CNA
CVE-2003-0962

Source: CONECTIVA
Type: UNKNOWN
CLA-2003:794

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:794
rsync

Source: CCN
Type: AppleCare Knowledge Base Document 61798
Security Update 2003-12-19 for Mac OS X 10.3.2 "Panther" and Mac OS X 10.3.2 Server

Source: BUGTRAQ
Type: UNKNOWN
20031204 rsync security advisory (fwd)

Source: TRUSTIX
Type: UNKNOWN
2003-0048

Source: BUGTRAQ
Type: UNKNOWN
20031204 [OpenPKG-SA-2003.051] OpenPKG Security Advisory (rsync)

Source: BUGTRAQ
Type: UNKNOWN
20031204 GLSA: exploitable heap overflow in rsync (200312-03)

Source: CCN
Type: RHSA-2003-398
New rsync packages fix remote security vulnerability

Source: CCN
Type: RHSA-2003-399
rsync security update

Source: CCN
Type: rsync download Web page
rsync

Source: CCN
Type: SA10353
rsync File Handling Integer Overflow Vulnerability

Source: SECUNIA
Type: UNKNOWN
10353

Source: SECUNIA
Type: UNKNOWN
10354

Source: SECUNIA
Type: UNKNOWN
10355

Source: SECUNIA
Type: UNKNOWN
10356

Source: SECUNIA
Type: UNKNOWN
10357

Source: SECUNIA
Type: UNKNOWN
10358

Source: SECUNIA
Type: UNKNOWN
10359

Source: SECUNIA
Type: UNKNOWN
10360

Source: SECUNIA
Type: UNKNOWN
10361

Source: SECUNIA
Type: UNKNOWN
10362

Source: SECUNIA
Type: UNKNOWN
10363

Source: SECUNIA
Type: UNKNOWN
10364

Source: SECUNIA
Type: UNKNOWN
10378

Source: CCN
Type: SA10474
Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
10474

Source: CCN
Type: CIAC Information Bulletin O-034
rsync Heap Overflow Vulnerability

Source: DEBIAN
Type: DSA-404
rsync -- heap overflow

Source: CCN
Type: GLSA-200312-03
rsync: exploitable heap overflow

Source: CCN
Type: US-CERT VU#325603
Integer overflow vulnerability in rsync

Source: CERT-VN
Type: US Government Resource
VU#325603

Source: CCN
Type: Immunix Secured OS Security Advisory IMNX-2003-73-001-01
rsync

Source: CCN
Type: SCO Security Advisory CSSA-2004-010.0
OpenLinux: rsync heap based overflow

Source: CCN
Type: rsync Mailing List, Sat, 04 Oct 2003 13:38:30 -0700
Possible security hole

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:111

Source: CCN
Type: OpenPKG-SA-2003.051
Rsync

Source: OSVDB
Type: UNKNOWN
2898

Source: CCN
Type: OSVDB ID: 2898
rsync Unspecified Remote Heap Overflow

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2003:398

Source: BID
Type: Patch, Vendor Advisory
9153

Source: CCN
Type: BID-9153
RSync Daemon Mode Undisclosed Remote Heap Overflow Vulnerability

Source: CCN
Type: slackware-security Mailing List, Wed, 3 Dec 2003 23:50:44 -0800 (PST)
rsync security update (SSA:2003-337-01)

Source: CCN
Type: Trustix Secure Linux Security Advisory #2003-0048
rsync

Source: CCN
Type: TLSA-2003-67
Heap overflow

Source: XF
Type: UNKNOWN
linux-rsync-heap-overflow(13899)

Source: XF
Type: UNKNOWN
linux-rsync-heap-overflow(13899)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9415

Source: SUSE
Type: SUSE-SA:2003:050
rsync: remote compromise

Vulnerable Configuration:Configuration 1:
  • cpe:/a:andrew_tridgell:rsync:2.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.4.4:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.4.5:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.4.6:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.4.8:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.5.5:*:*:*:*:*:*:*
  • OR cpe:/a:andrew_tridgell:rsync:2.5.6:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:rsync:2.4.6-2:*:i386:*:*:*:*:*
  • OR cpe:/a:redhat:rsync:2.4.6-5:*:i386:*:*:*:*:*
  • OR cpe:/a:redhat:rsync:2.4.6-5:*:ia64:*:*:*:*:*
  • OR cpe:/a:redhat:rsync:2.5.4-2:*:i386:*:*:*:*:*
  • OR cpe:/a:redhat:rsync:2.5.5-1:*:i386:*:*:*:*:*
  • OR cpe:/a:redhat:rsync:2.5.5-4:*:i386:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_community:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_community:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_linux:1.1:*:professional:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_linux:1.2:*:professional:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_linux:1.5:*:professional:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:current:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20030962
    V
    CVE-2003-0962
    2015-11-16
    oval:org.mitre.oval:def:9415
    V
    Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail.
    2013-04-29
    oval:com.redhat.rhsa:def:20030399
    P
    RHSA-2003:399: rsync security update (Critical)
    2003-12-04
    oval:org.debian:def:404
    V
    heap overflow
    2003-12-04
    BACK
    andrew_tridgell rsync 2.3.1
    andrew_tridgell rsync 2.3.2
    andrew_tridgell rsync 2.4.0
    andrew_tridgell rsync 2.4.1
    andrew_tridgell rsync 2.4.3
    andrew_tridgell rsync 2.4.4
    andrew_tridgell rsync 2.4.5
    andrew_tridgell rsync 2.4.6
    andrew_tridgell rsync 2.4.8
    andrew_tridgell rsync 2.5.0
    andrew_tridgell rsync 2.5.1
    andrew_tridgell rsync 2.5.2
    andrew_tridgell rsync 2.5.3
    andrew_tridgell rsync 2.5.4
    andrew_tridgell rsync 2.5.5
    andrew_tridgell rsync 2.5.6
    redhat rsync 2.4.6-2
    redhat rsync 2.4.6-5
    redhat rsync 2.4.6-5
    redhat rsync 2.5.4-2
    redhat rsync 2.5.5-1
    redhat rsync 2.5.5-4
    engardelinux secure community 1.0.1
    engardelinux secure community 2.0
    engardelinux secure linux 1.1
    engardelinux secure linux 1.2
    engardelinux secure linux 1.5
    slackware slackware linux 8.1
    slackware slackware linux 9.0
    slackware slackware linux 9.1
    slackware slackware linux current