{ "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-1720", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in rsync 2.6.9 to 3.0.1, with extended attribute (xattr) support enabled, might allow remote attackers to execute arbitrary code via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29856", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29856" }, { "name": "29788", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29788" }, { "name": "SUSE-SR:2008:011", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html" }, { "name": "GLSA-200804-16", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200804-16.xml" }, { "name": "[rsync-announce] 20080408 Rsync 3.0.2 released w/xattr security fix (attn: 2.6.9 onward)", "refsource": "MLIST", "url": "http://www.mail-archive.com/rsync-announce@lists.samba.org/msg00057.html" }, { "name": "USN-600-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/600-1/" }, { "name": "29781", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29781" }, { "name": "http://sourceforge.net/project/shownotes.php?release_id=591462&group_id=69227", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=591462&group_id=69227" }, { "name": "ADV-2008-1215", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1215/references" }, { "name": "29770", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29770" }, { "name": "FEDORA-2008-3047", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00237.html" }, { "name": "http://rsync.samba.org/ftp/rsync/security/rsync-3.0.1-xattr-alloc.diff", "refsource": "CONFIRM", "url": "http://rsync.samba.org/ftp/rsync/security/rsync-3.0.1-xattr-alloc.diff" }, { "name": "http://samba.anu.edu.au/rsync/security.html#s3_0_2", "refsource": "CONFIRM", "url": "http://samba.anu.edu.au/rsync/security.html#s3_0_2" }, { "name": "MDVSA-2008:084", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:084" }, { "name": "ADV-2008-1191", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1191/references" }, { "name": "28726", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28726" }, { "name": "1019835", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019835" }, { "name": "29861", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29861" }, { "name": "29668", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29668" }, { "name": "DSA-1545", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1545" }, { "name": "HPSBMA02447", "refsource": "HP", "url": "http://marc.info/?l=bugtraq&m=125017764422557&w=2" }, { "name": "FEDORA-2008-3060", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00247.html" }, { "name": "29777", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29777" }, { "name": "rsync-xattr-bo(41766)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41766" }, { "name": "SSRT090062", "refsource": "HP", "url": "http://marc.info/?l=bugtraq&m=125017764422557&w=2" }, { "name": "44369", "refsource": "OSVDB", "url": "http://www.osvdb.org/44369" }, { "name": "44368", "refsource": "OSVDB", "url": "http://www.osvdb.org/44368" } ] } }