CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
87.3%
Package : rsync
Version : 3.1.1-3+deb8u2
CVE ID : CVE-2016-9840 CVE-2016-9841 CVE-2016-9842 CVE-2016-9843
CVE-2018-5764
Trail of Bits used the automated vulnerability discovery tools developed
for the DARPA Cyber Grand Challenge to audit zlib. As rsync, a fast,
versatile, remote (and local) file-copying tool, uses an embedded copy of
zlib, those issues are also present in rsync.
CVE-2016-9840
In order to avoid undefined behavior, remove offset pointer
optimization, as this is not compliant with the C standard.
CVE-2016-9841
Only use post-increment to be compliant with the C standard.
CVE-2016-9842
In order to avoid undefined behavior, do not shift negative values,
as this is not compliant with the C standard.
CVE-2016-9843
In order to avoid undefined behavior, do not pre-decrement a pointer
in big-endian CRC calculation, as this is not compliant with the
C standard.
CVE-2018-5764
Prevent remote attackers from being able to bypass the
argument-sanitization protection mechanism by ignoring --protect-args
when already sent by client.
For Debian 8 "Jessie", these problems have been fixed in version
3.1.1-3+deb8u2.
We recommend that you upgrade your rsync packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | i386 | zlib1g-dev | < 1:1.2.8.dfsg-2+deb8u1 | zlib1g-dev_1:1.2.8.dfsg-2+deb8u1_i386.deb |
Debian | 8 | amd64 | zlib1g-dev | < 1:1.2.8.dfsg-2+deb8u1 | zlib1g-dev_1:1.2.8.dfsg-2+deb8u1_amd64.deb |
Debian | 8 | armhf | zlib1g-udeb | < 1:1.2.8.dfsg-2+deb8u1 | zlib1g-udeb_1:1.2.8.dfsg-2+deb8u1_armhf.deb |
Debian | 8 | amd64 | lib32z1-dev | < 1:1.2.8.dfsg-2+deb8u1 | lib32z1-dev_1:1.2.8.dfsg-2+deb8u1_amd64.deb |
Debian | 9 | ppc64el | rsync | < 3.1.2-1+deb9u2 | rsync_3.1.2-1+deb9u2_ppc64el.deb |
Debian | 8 | armel | zlib1g-dev | < 1:1.2.8.dfsg-2+deb8u1 | zlib1g-dev_1:1.2.8.dfsg-2+deb8u1_armel.deb |
Debian | 8 | amd64 | rsync | < 3.1.1-3+deb8u2 | rsync_3.1.1-3+deb8u2_amd64.deb |
Debian | 9 | i386 | rsync | < 3.1.2-1+deb9u2 | rsync_3.1.2-1+deb9u2_i386.deb |
Debian | 9 | armhf | rsync | < 3.1.2-1+deb9u2 | rsync_3.1.2-1+deb9u2_armhf.deb |
Debian | 9 | mips64el | rsync | < 3.1.2-1+deb9u2 | rsync_3.1.2-1+deb9u2_mips64el.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
87.3%