rsync
Page content
- Author: vmiklos
- Vulnerable: 2.6.9-1
- Unaffected: 2.6.9-2terminus1
Sebastian Krahmer has reported a vulnerability in rsync, which can potentially be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an off-by-one error within the “f_name()” function in flist.c and can be exploited to cause a one-byte stack-based buffer overflow via an overly long directory name.
- Bug Tracker URL: http://bugs.frugalware.org/task/2371