7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
rsync is vulnerable to access control bypass. The parse_arguments
function in options.c
does not prevent multiple --protect-args uses and allows remote attackers to bypass the argument-sanitization protection mechanism.
CPE | Name | Operator | Version |
---|---|---|---|
rsync:3.4 | eq | 3.1.2-r2 | |
rsync:stretch | eq | 3.1.2-1+deb9u2 |
www.securityfocus.com/bid/102803
www.securitytracker.com/id/1040276
download.samba.org/pub/rsync/src-previews/rsync-3.1.3pre1-NEWS
git.samba.org/rsync.git/?p=rsync.git;a=commit;h=7706303828fcde524222babb2833864a4bd09e07
lists.debian.org/debian-lts-announce/2018/01/msg00021.html
lists.debian.org/debian-lts-announce/2019/03/msg00027.html
lists.debian.org/debian-lts-announce/2021/11/msg00028.html
security.gentoo.org/glsa/201805-04
usn.ubuntu.com/3543-1/
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N