rsync 3.1.3-development before 2017-10-24 mishandles archaic checksums, which makes it easier for remote attackers to bypass intended access restrictions. NOTE: the rsync development branch has significant use beyond the rsync developers, e.g., the code has been copied for use in various GitHub projects.
References
Link | Resource |
---|---|
https://git.samba.org/?p=rsync.git;a=commit;h=c252546ceeb0925eb8a4061315e3ff0a8c55b48b | Issue Tracking Patch Third Party Advisory |
https://git.samba.org/?p=rsync.git;a=commit;h=9a480deec4d20277d8e20bc55515ef0640ca1e55 | Issue Tracking Patch Third Party Advisory |
https://git.samba.org/?p=rsync.git;a=commit;h=7b8a4ecd6ff9cdf4e5d3850ebf822f1e989255b3 | Issue Tracking Patch Third Party Advisory |
Configurations
Information
Published : 2017-10-28 23:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-15994
Mitre link : CVE-2017-15994
JSON object : View
CWE
CWE-354
Improper Validation of Integrity Check Value
Products Affected
samba
- rsync