Samba

Rsync

16 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 3.76%
  • Published 15.01.2025 15:15:10
  • Last modified 08.07.2025 04:15:35

A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write...

Exploit
  • EPSS 9.67%
  • Published 14.01.2025 18:15:25
  • Last modified 12.08.2025 21:15:27

A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of un...

Media report Exploit
  • EPSS 0.92%
  • Published 14.01.2025 18:15:25
  • Last modified 12.08.2025 21:15:27

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using...

  • EPSS 0.72%
  • Published 14.01.2025 18:15:25
  • Last modified 12.08.2025 21:15:28

A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, w...

Exploit
  • EPSS 0.35%
  • Published 02.08.2022 15:15:08
  • Last modified 21.11.2024 06:58:35

An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client perfo...

  • EPSS 0.14%
  • Published 27.05.2021 20:15:07
  • Last modified 21.11.2024 05:03:09

A flaw was found in rsync in versions since 3.2.0pre1. Rsync improperly validates certificate with host mismatch vulnerability. A remote, unauthenticated attacker could exploit the flaw by performing a man-in-the-middle attack using a valid certifica...

  • EPSS 2.25%
  • Published 17.01.2018 22:29:00
  • Last modified 21.11.2024 04:09:21

The parse_arguments function in options.c in rsyncd in rsync before 3.1.3 does not prevent multiple --protect-args uses, which allows remote attackers to bypass an argument-sanitization protection mechanism.

  • EPSS 1.56%
  • Published 06.12.2017 03:29:00
  • Last modified 20.04.2025 01:37:25

The recv_files function in receiver.c in the daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, proceeds with certain file metadata updates before checking for a filename in the daemon_filter_list data structure, which allows remote atta...

  • EPSS 1.16%
  • Published 06.12.2017 03:29:00
  • Last modified 20.04.2025 01:37:25

The daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, does not check for fnamecmp filenames in the daemon_filter_list data structure (in the recv_files function in receiver.c) and also does not apply the sanitize_paths protection mechan...

  • EPSS 2.96%
  • Published 06.11.2017 05:29:00
  • Last modified 20.04.2025 01:37:25

The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing '\0' character in an xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) ...