8 results (0.019 seconds)

CVSS: 7.4EPSS: 0%CPEs: 3EXPL: 2

An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file). Se ha detectado un problema en rsync versiones anteriores a 3.2.5, que permite a servidores remotos maliciosos escribir archivos arbitrarios dentro de los directorios de los pares conectados. • https://github.com/EgeBalci/CVE-2022-29154 http://www.openwall.com/lists/oss-security/2022/08/02/1 https://github.com/WayneD/rsync/tags https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2 https://access.redhat.com/security/cve/CVE-2022-29154 https://bugzilla.redhat.com/show_bug.cgi?id=2110928 • CWE-20: Improper Input Validation CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

The parse_arguments function in options.c in rsyncd in rsync before 3.1.3 does not prevent multiple --protect-args uses, which allows remote attackers to bypass an argument-sanitization protection mechanism. La función parse_arguments en options.c en rsync, en versiones anteriores a la 3.1.3, no evita los usos múltiples de --protect-args, lo que permite que atacantes remotos omitan un mecanismo de protección de saneamiento de argumentos. • http://www.securityfocus.com/bid/102803 http://www.securitytracker.com/id/1040276 https://download.samba.org/pub/rsync/src-previews/rsync-3.1.3pre1-NEWS https://git.samba.org/rsync.git/?p=rsync.git%3Ba=commit%3Bh=7706303828fcde524222babb2833864a4bd09e07 https://lists.debian.org/debian-lts-announce/2018/01/msg00021.html https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html https://lists.debian.org/debian-lts-announce/2021/11/msg00028.html https://security.gentoo.org/glsa/ •

CVSS: 9.8EPSS: 1%CPEs: 3EXPL: 0

The daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, does not check for fnamecmp filenames in the daemon_filter_list data structure (in the recv_files function in receiver.c) and also does not apply the sanitize_paths protection mechanism to pathnames found in "xname follows" strings (in the read_ndx_and_attrs function in rsync.c), which allows remote attackers to bypass intended access restrictions. El demonio en rsync 3.1.2 y 3.1.3-development en versiones anteriores a la 2017-11-03 no busca nombres de archivo fnamecmp en la estructura de datos daemon_filter_list (en la función recv_files en receiver.c) y tampoco aplica el mecanismo de protección sanitize_paths a los nombres de ruta hallados en cadenas "xname follows" (en la función read_ndx_and_attrs en rsync.c). Esto permite que atacantes remotos omitan las restricciones de acceso planeadas. • http://security.cucumberlinux.com/security/details.php?id=170 https://git.samba.org/?p=rsync.git%3Ba=commit%3Bh=5509597decdbd7b91994210f700329d8a35e70a1 https://git.samba.org/?p=rsync.git%3Ba=commit%3Bh=70aeb5fddd1b2f8e143276f8d5a085db16c593b9 https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html https://www.debian.org/security/2017/dsa-4068 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

rsync 3.1.3-development before 2017-10-24 mishandles archaic checksums, which makes it easier for remote attackers to bypass intended access restrictions. NOTE: the rsync development branch has significant use beyond the rsync developers, e.g., the code has been copied for use in various GitHub projects. rsync 3.1.3-development en versiones anteriores al 24/10/2017 gestiona de manera incorrecta las sumas de verificación arcaicas, lo que hace que sea más fácil para los atacantes remotos omitir las restricciones de acceso establecidas. NOTA: la rama de desarrollo rsync tiene un uso importante más allá de los desarrolladores rsync; por ejemplo, el código se ha copiado para su uso en varios proyectos en GitHub. • https://git.samba.org/?p=rsync.git%3Ba=commit%3Bh=7b8a4ecd6ff9cdf4e5d3850ebf822f1e989255b3 https://git.samba.org/?p=rsync.git%3Ba=commit%3Bh=9a480deec4d20277d8e20bc55515ef0640ca1e55 https://git.samba.org/?p=rsync.git%3Ba=commit%3Bh=c252546ceeb0925eb8a4061315e3ff0a8c55b48b • CWE-354: Improper Validation of Integrity Check Value •

CVSS: 7.8EPSS: 4%CPEs: 42EXPL: 0

The check_secret function in authenticate.c in rsync 3.1.0 and earlier allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a user name which does not exist in the secrets file. La función check_secret en authenticate.c en rsync 3.1.0 y anteriores permite a atacantes remotos causar una denegación de servicio (bucle infinito y consumo de CPU) a través de un nombre de usuario que no existe en el archivo de secretos. • http://advisories.mageia.org/MGASA-2015-0065.html http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131910.html http://lists.opensuse.org/opensuse-updates/2014-05/msg00006.html http://secunia.com/advisories/57948 http://www.mandriva.com/security/advisories?name=MDVSA-2015:131 http://www.openwall.com/lists/oss-security/2014/04/14/5 http://www.openwall.com/lists/oss-security/2014/04/15/1 http://www.ubuntu.com/usn/USN-2171-1 https://bugs.launchpad.net/ • CWE-20: Improper Input Validation •