CVE-2017-17433
Ubuntu Security Notice USN-3506-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The recv_files function in receiver.c in the daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, proceeds with certain file metadata updates before checking for a filename in the daemon_filter_list data structure, which allows remote attackers to bypass intended access restrictions.
La función recv_files en receiver.c en el demonio en rsync 3.1.2 y 3.1.3-development en versiones anteriores a la 2017-11-03 continúa ciertas actualizaciones de metadatos de archivos antes de buscar un nombre de archivo en la estructura de datos daemon_filter_list. Esto permite que atacantes remotos omitan las restricciones de acceso planeadas.
It was discovered that rsync proceeds with certain file metadata updates before checking for a filename. An attacker could use this to bypass access restrictions. It was discovered that rsync does not check for fnamecmp filenames and also does not apply the sanitize_paths protection mechanism to pathnames. An attacker could use this to bypass access restrictions. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-12-05 CVE Reserved
- 2017-12-06 CVE Published
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-862: Missing Authorization
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://security.cucumberlinux.com/security/details.php?id=169 | Third Party Advisory | |
https://git.samba.org/?p=rsync.git%3Ba=commit%3Bh=3e06d40029cfdce9d0f73d87cfd4edaf54be9c51 | X_refsource_misc | |
https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1522874#c4 | 2023-11-07 |
URL | Date | SRC |
---|---|---|
https://www.debian.org/security/2017/dsa-4068 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Samba Search vendor "Samba" | Rsync Search vendor "Samba" for product "Rsync" | 3.1.2 Search vendor "Samba" for product "Rsync" and version "3.1.2" | - |
Affected
|