Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2004-2093 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Samba Rsync
6 documents6 sources
Severity
4.6MEDIUMNVD
EPSS
0.7%
top 27.34%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedFeb 9
Latest updateApr 29
Description
Buffer overflow in the open_socket_out function in socket.c for rsync 2.5.7 and earlier allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long RSYNC_PROXY environment variable. NOTE: since rsync is not setuid, this issue does not provide any additional privileges beyond those that are already available to the user. Therefore this issue may be REJECTED in the future.
CVSS vector
AV:L/AC:L/C:P/I:P/A:PExploitability: 3.9 | Impact: 6.4
Affected Packages1 packages
🔴Vulnerability Details
3💥Exploits & PoCs
1📋Vendor Advisories
1Debian▶
CVE-2004-2093: rsync - Buffer overflow in the open_socket_out function in socket.c for rsync 2.5.7 and ...↗2004