FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-05-17 07:51:36 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
21f43976-1887-11ed-9911-40b034429ecfrsync -- client-side arbitrary file write vulnerability

Openwall oss-security reports:

We have discovered a critical arbitrary file write vulnerability in the rsync utility that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. Due to the insufficient controls inside the do_server_recv function a malicious rysnc server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories.


Discovery 2022-08-02
Entry 2022-08-10
rsync
< 3.2.5

CVE-2022-29154
https://www.openwall.com/lists/oss-security/2022/08/02/1
73ea0706-9c57-11d8-9366-0020ed76ef5arsync path traversal issue

When running rsync in daemon mode, no checks were made to prevent clients from writing outside of a module's `path' setting.


Discovery 2004-04-26
Entry 2004-05-02
rsync
< 2.6.1

CVE-2004-0426
http://rsync.samba.org/#security_apr04
5729b8ed-5d75-11d8-80e3-0020ed76ef5arsync buffer overflow in server mode

When rsync is run in server mode, a buffer overflow could allow a remote attacker to execute arbitrary code with the privileges of the rsync server. Anonymous rsync servers are at the highest risk.


Discovery 2003-12-04
Entry 2004-02-12
rsync
< 2.5.7

CVE-2003-0962
http://lists.samba.org/archive/rsync-announce/2003/000011.html
http://rsync.samba.org/#security
af8e3a0c-5009-11dc-8a43-003048705d5arsync -- off by one stack overflow

BugTraq reports:

The rsync utility is prone to an off-by-one buffer-overflow vulnerability. This issue is due to a failure of the application to properly bounds-check user-supplied input.

Successfully exploiting this issue may allow arbitrary code-execution in the context of the affected utility.


Discovery 2007-08-15
Entry 2007-08-21
Modified 2007-08-23
rsync
< 2.6.9_1

25336
CVE-2007-4091
085399ab-dfd7-11ea-96e4-80ee73bc7b66net/rsync -- multiple zlib issues

rsync developers reports:

Various zlib fixes, including security fixes for CVE-2016-9843, CVE-2016-9842, CVE-2016-9841, and CVE-2016-9840


Discovery 2020-06-19
Entry 2020-08-16
rsync
< 3.2.0

https://download.samba.org/pub/rsync/NEWS#3.2.0
CVE-2016-9843
CVE-2016-9842
CVE-2016-9841
CVE-2016-9840
2689f4cb-ec4c-11d8-9440-000347a4fa7drsync -- path sanitizing vulnerability

An rsync security advisory reports:

There is a path-sanitizing bug that affects daemon mode in all recent rsync versions (including 2.6.2) but only if chroot is disabled.

The bug may allow a remote user to access files outside of an rsync module's configured path with the privileges configured for that module.


Discovery 2004-08-12
Entry 2004-08-26
rsync
< 2.6.2_2

CVE-2004-0792
http://samba.org/rsync/#security_aug04
http://lists.samba.org/archive/rsync-announce/2004/000017.html
http://secunia.com/advisories/12294
http://www.osvdb.org/8829