Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2003-0962
Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.4
EPSS Ranking
97.1%
CVSS Severity
CVSS v2 Score
7.5
References
ftp://patches.sgi.com/support/free/security/advisories/20031202-01-U
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000794
http://marc.info/?l=bugtraq&m=107055681311602&w=2
http://marc.info/?l=bugtraq&m=107055684711629&w=2
http://marc.info/?l=bugtraq&m=107055702911867&w=2
http://marc.info/?l=bugtraq&m=107056923528423&w=2
http://secunia.com/advisories/10353
http://secunia.com/advisories/10354
http://secunia.com/advisories/10355
http://secunia.com/advisories/10356
http://secunia.com/advisories/10357
http://secunia.com/advisories/10358
http://secunia.com/advisories/10359
http://secunia.com/advisories/10360
http://secunia.com/advisories/10361
http://secunia.com/advisories/10362
http://secunia.com/advisories/10363
http://secunia.com/advisories/10364
http://secunia.com/advisories/10378
http://secunia.com/advisories/10474
http://www.kb.cert.org/vuls/id/325603
http://www.mandriva.com/security/advisories?name=MDKSA-2003:111
http://www.osvdb.org/2898
http://www.redhat.com/support/errata/RHSA-2003-398.html
http://www.securityfocus.com/bid/9153
https://exchange.xforce.ibmcloud.com/vulnerabilities/13899
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9415
ftp://patches.sgi.com/support/free/security/advisories/20031202-01-U
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000794
http://marc.info/?l=bugtraq&m=107055681311602&w=2
http://marc.info/?l=bugtraq&m=107055684711629&w=2
http://marc.info/?l=bugtraq&m=107055702911867&w=2
http://marc.info/?l=bugtraq&m=107056923528423&w=2
http://secunia.com/advisories/10353
http://secunia.com/advisories/10354
http://secunia.com/advisories/10355
http://secunia.com/advisories/10356
http://secunia.com/advisories/10357
http://secunia.com/advisories/10358
http://secunia.com/advisories/10359
http://secunia.com/advisories/10360
http://secunia.com/advisories/10361
http://secunia.com/advisories/10362
http://secunia.com/advisories/10363
http://secunia.com/advisories/10364
http://secunia.com/advisories/10378
http://secunia.com/advisories/10474
http://www.kb.cert.org/vuls/id/325603
http://www.mandriva.com/security/advisories?name=MDKSA-2003:111
http://www.osvdb.org/2898
http://www.redhat.com/support/errata/RHSA-2003-398.html
http://www.securityfocus.com/bid/9153
https://exchange.xforce.ibmcloud.com/vulnerabilities/13899
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9415
Products affected by CVE-2003-0962
Andrew Tridgell
»
Rsync
»
Version:
2.3.1
cpe:2.3:a:andrew_tridgell:rsync:2.3.1
Andrew Tridgell
»
Rsync
»
Version:
2.3.2
cpe:2.3:a:andrew_tridgell:rsync:2.3.2
Andrew Tridgell
»
Rsync
»
Version:
2.4.0
cpe:2.3:a:andrew_tridgell:rsync:2.4.0
Andrew Tridgell
»
Rsync
»
Version:
2.4.1
cpe:2.3:a:andrew_tridgell:rsync:2.4.1
Andrew Tridgell
»
Rsync
»
Version:
2.4.3
cpe:2.3:a:andrew_tridgell:rsync:2.4.3
Andrew Tridgell
»
Rsync
»
Version:
2.4.4
cpe:2.3:a:andrew_tridgell:rsync:2.4.4
Andrew Tridgell
»
Rsync
»
Version:
2.4.5
cpe:2.3:a:andrew_tridgell:rsync:2.4.5
Andrew Tridgell
»
Rsync
»
Version:
2.4.6
cpe:2.3:a:andrew_tridgell:rsync:2.4.6
Andrew Tridgell
»
Rsync
»
Version:
2.4.8
cpe:2.3:a:andrew_tridgell:rsync:2.4.8
Andrew Tridgell
»
Rsync
»
Version:
2.5.0
cpe:2.3:a:andrew_tridgell:rsync:2.5.0
Andrew Tridgell
»
Rsync
»
Version:
2.5.1
cpe:2.3:a:andrew_tridgell:rsync:2.5.1
Andrew Tridgell
»
Rsync
»
Version:
2.5.2
cpe:2.3:a:andrew_tridgell:rsync:2.5.2
Andrew Tridgell
»
Rsync
»
Version:
2.5.3
cpe:2.3:a:andrew_tridgell:rsync:2.5.3
Andrew Tridgell
»
Rsync
»
Version:
2.5.4
cpe:2.3:a:andrew_tridgell:rsync:2.5.4
Andrew Tridgell
»
Rsync
»
Version:
2.5.5
cpe:2.3:a:andrew_tridgell:rsync:2.5.5
Andrew Tridgell
»
Rsync
»
Version:
2.5.6
cpe:2.3:a:andrew_tridgell:rsync:2.5.6
Redhat
»
Rsync
»
Version:
2.4.6-2
cpe:2.3:a:redhat:rsync:2.4.6-2
Redhat
»
Rsync
»
Version:
2.4.6-5
cpe:2.3:a:redhat:rsync:2.4.6-5
Redhat
»
Rsync
»
Version:
2.5.4-2
cpe:2.3:a:redhat:rsync:2.5.4-2
Redhat
»
Rsync
»
Version:
2.5.5-1
cpe:2.3:a:redhat:rsync:2.5.5-1
Redhat
»
Rsync
»
Version:
2.5.5-4
cpe:2.3:a:redhat:rsync:2.5.5-4
Engardelinux
»
Secure Community
»
Version:
1.0.1
cpe:2.3:o:engardelinux:secure_community:1.0.1
Engardelinux
»
Secure Community
»
Version:
2.0
cpe:2.3:o:engardelinux:secure_community:2.0
Engardelinux
»
Secure Linux
»
Version:
1.1
cpe:2.3:o:engardelinux:secure_linux:1.1
Engardelinux
»
Secure Linux
»
Version:
1.2
cpe:2.3:o:engardelinux:secure_linux:1.2
Engardelinux
»
Secure Linux
»
Version:
1.5
cpe:2.3:o:engardelinux:secure_linux:1.5
Slackware
»
Slackware Linux
»
Version:
8.1
cpe:2.3:o:slackware:slackware_linux:8.1
Slackware
»
Slackware Linux
»
Version:
9.0
cpe:2.3:o:slackware:slackware_linux:9.0
Slackware
»
Slackware Linux
»
Version:
9.1
cpe:2.3:o:slackware:slackware_linux:9.1
Slackware
»
Slackware Linux
»
Version:
current
cpe:2.3:o:slackware:slackware_linux:current
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved