The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing '\0' character in an xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to the daemon.
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16548
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16548
댓글 0
번호 | 제목 | 글쓴이 | 날짜 | 조회 수 |
---|---|---|---|---|
227 | CVE-2016-6990 | 관리자 | 2016.10.14 | 3 |
226 | CVE-2016-6989 | 관리자 | 2016.10.14 | 3 |
225 | CVE-2016-3232 | 관리자 | 2016.06.17 | 3 |
224 | CVE-2016-3227 | 관리자 | 2016.06.17 | 3 |
223 | CVE-2016-3226 | 관리자 | 2016.06.17 | 3 |
222 | CVE-2016-3219 | 관리자 | 2016.06.17 | 3 |
221 | CVE-2016-3216 | 관리자 | 2016.06.17 | 3 |
220 | CVE-2016-3215 | 관리자 | 2016.06.17 | 3 |
219 | CVE-2016-3214 | 관리자 | 2016.06.17 | 3 |
218 | CVE-2016-3213 | 관리자 | 2016.06.17 | 3 |
217 | CVE-2017-2922 | 관리자 | 2017.11.09 | 2 |
216 | CVE-2017-12083 | 관리자 | 2017.11.09 | 2 |
215 | CVE-2015-7529 | 관리자 | 2017.11.09 | 2 |
214 | CVE-2017-16524 | 관리자 | 2017.11.09 | 2 |
» | CVE-2017-16548 | 관리자 | 2017.11.09 | 2 |