First published: Wed Dec 06 2017(Updated: )
The daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, does not check for fnamecmp filenames in the daemon_filter_list data structure (in the recv_files function in receiver.c) and also does not apply the sanitize_paths protection mechanism to pathnames found in "xname follows" strings (in the read_ndx_and_attrs function in rsync.c), which allows remote attackers to bypass intended access restrictions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/rsync | 3.1.3-6 3.2.3-4+deb11u1 3.2.7-1 | |
debian/rsync | <=3.1.1-1<=3.1.2-2 | 3.1.2-2.1 3.1.2-1+deb9u1 3.1.1-3+deb8u1 |
Samba Rsync | <=3.1.2 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-17434 is critical with a CVSS score of 9.8.
The affected software includes rsync versions 3.1.2 and 3.1.3-development before 2017-12-03.
To mitigate the vulnerability in CVE-2017-17434, update rsync to the latest version (3.1.3-6 or 3.2.7-1) provided by your distribution or vendor.
You can find more information about CVE-2017-17434 in the references section of the vulnerability report.