First published: Sun Oct 29 2017(Updated: )
rsync 3.1.3-development before 2017-10-24 mishandles archaic checksums, which makes it easier for remote attackers to bypass intended access restrictions. NOTE: the rsync development branch has significant use beyond the rsync developers, e.g., the code has been copied for use in various GitHub projects.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samba Rsync | <=3.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-15994 is critical with a score of 9.8.
CVE-2017-15994 affects rsync version 3.1.2 and earlier.
CVE-2017-15994 is a vulnerability in rsync that mishandles archaic checksums, making it easier for remote attackers to bypass intended access restrictions.
Remote attackers can exploit CVE-2017-15994 by leveraging the mishandling of archaic checksums to bypass access restrictions.
Yes, the fix for CVE-2017-15994 is available in rsync version 3.1.3-development released on October 24, 2017.