fkie_cve-2007-4091
Vulnerability from fkie_nvd
Published
2007-08-16 00:17
Modified
2024-11-21 00:34
Severity ?
Summary
Multiple off-by-one errors in the sender.c in rsync 2.6.9 might allow remote attackers to execute arbitrary code via directory names that are not properly handled when calling the f_name function.
References
cve@mitre.orghttp://article.gmane.org/gmane.linux.debian.devel.bugs.general/291908
cve@mitre.orghttp://c-skills.blogspot.com/2007/08/cve-2007-4091.html
cve@mitre.orghttp://secunia.com/advisories/26493
cve@mitre.orghttp://secunia.com/advisories/26518
cve@mitre.orghttp://secunia.com/advisories/26537
cve@mitre.orghttp://secunia.com/advisories/26543
cve@mitre.orghttp://secunia.com/advisories/26548
cve@mitre.orghttp://secunia.com/advisories/26634
cve@mitre.orghttp://secunia.com/advisories/26822
cve@mitre.orghttp://secunia.com/advisories/26911
cve@mitre.orghttp://secunia.com/advisories/27896
cve@mitre.orghttp://secunia.com/advisories/61039
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200709-13.xml
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.481089
cve@mitre.orghttp://support.f5.com/kb/en-us/solutions/public/15000/500/sol15548.html
cve@mitre.orghttp://www.debian.org/security/2007/dsa-1360
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_17_sr.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/477628/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/25336
cve@mitre.orghttp://www.trustix.org/errata/2007/0026/
cve@mitre.orghttp://www.ubuntu.com/usn/usn-500-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2915
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/36072
cve@mitre.orghttps://issues.rpath.com/browse/RPL-1647
af854a3a-2127-422b-91ae-364da2661108http://article.gmane.org/gmane.linux.debian.devel.bugs.general/291908
af854a3a-2127-422b-91ae-364da2661108http://c-skills.blogspot.com/2007/08/cve-2007-4091.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26493
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26518
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26537
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26543
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26548
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26634
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26822
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26911
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27896
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61039
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200709-13.xml
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.481089
af854a3a-2127-422b-91ae-364da2661108http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15548.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1360
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_17_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/477628/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25336
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2007/0026/
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-500-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2915
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/36072
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1647
Impacted products
Vendor Product Version
rsync rsync 2.6.9



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rsync:rsync:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "32A205AF-8E75-4AD8-BE0F-EC6A9296D127",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple off-by-one errors in the sender.c in rsync 2.6.9 might allow remote attackers to execute arbitrary code via directory names that are not properly handled when calling the f_name function."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples errores de superaci\u00f3n de l\u00edmite (off-by-one) en sender.c de rsync 2.6.9 podr\u00eda permitir a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante nombres de directorio que no son manejados adecuadamente al llamar a la funci\u00f3n f_name."
    }
  ],
  "id": "CVE-2007-4091",
  "lastModified": "2024-11-21T00:34:45.690",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-08-16T00:17:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://article.gmane.org/gmane.linux.debian.devel.bugs.general/291908"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://c-skills.blogspot.com/2007/08/cve-2007-4091.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26493"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26518"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26537"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26543"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26548"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26634"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26822"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26911"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27896"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/61039"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200709-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.481089"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15548.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1360"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_17_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/477628/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/25336"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2007/0026/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-500-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2915"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36072"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-1647"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://article.gmane.org/gmane.linux.debian.devel.bugs.general/291908"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://c-skills.blogspot.com/2007/08/cve-2007-4091.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26493"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26518"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26537"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26543"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26548"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26634"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26822"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26911"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27896"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/61039"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200709-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.481089"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15548.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1360"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_17_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/477628/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/25336"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2007/0026/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-500-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2915"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36072"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1647"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable.  This flaw did not affect Red Hat Enterprise Linux 2.1, 3, or 4 due to the version of rsync.\n\nThis flaw does exist in Red Hat Enterprise Linux 5, but due to the nature of the flaw it is not exploitable with any security consequence due to stack-protector.",
      "lastModified": "2007-08-22T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.