CVE-2008-1720

N/A Unknown
Published: April 10, 2008 Modified: April 23, 2026
View on NVD

Description

Buffer overflow in rsync 2.6.9 to 3.0.1, with extended attribute (xattr) support enabled, might allow remote attackers to execute arbitrary code via unknown vectors.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/29668
Source: secalert@redhat.com
http://secunia.com/advisories/29770
Source: secalert@redhat.com
http://secunia.com/advisories/29777
Source: secalert@redhat.com
http://secunia.com/advisories/29781
Source: secalert@redhat.com
http://secunia.com/advisories/29788
Source: secalert@redhat.com
http://secunia.com/advisories/29856
Source: secalert@redhat.com
http://secunia.com/advisories/29861
Source: secalert@redhat.com
http://www.osvdb.org/44368
Source: secalert@redhat.com
http://www.osvdb.org/44369
Source: secalert@redhat.com
http://www.securityfocus.com/bid/28726
Source: secalert@redhat.com
https://usn.ubuntu.com/600-1/
Source: secalert@redhat.com
http://marc.info/?l=bugtraq&m=125017764422557&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://rsync.samba.org/ftp/rsync/security/rsync-3.0.1-xattr-alloc.diff
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://samba.anu.edu.au/rsync/security.html#s3_0_2
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://secunia.com/advisories/29668
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29770
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29777
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29781
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29788
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29856
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29861
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200804-16.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2008/dsa-1545
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2008:084
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/44368
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/44369
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/28726
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1019835
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1191/references
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1215/references
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/41766
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/600-1/
Source: af854a3a-2127-422b-91ae-364da2661108

52 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
8.4%
92th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

samba