First published: Wed Jan 17 2018(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/rsync | 3.2.3-4+deb11u1 3.2.3-4+deb11u3 3.2.7-1 3.2.7-1+deb12u2 3.3.0+ds1-4 | |
Samba | <3.1.3 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =17.10 |
https://git.samba.org/rsync.git/?p=rsync.git;a=commit;h=7706303828fcde524222babb2833864a4bd09e07
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5764 is a vulnerability in the rsync software before version 3.1.3 that allows remote attackers to bypass an argument-sanitization protection mechanism by using multiple --protect-args options.
CVE-2018-5764 affects Samba Rsync, Debian Debian Linux versions 7.0, 8.0, and 9.0, and Canonical Ubuntu Linux versions 14.04, 16.04, and 17.10.
The severity of CVE-2018-5764 is high, with a CVSS score of 7.5.
To fix CVE-2018-5764, update rsync to version 3.1.3 or higher.
You can find more information about CVE-2018-5764 at the following references: [SecurityFocus](http://www.securityfocus.com/bid/102803), [SecurityTracker](http://www.securitytracker.com/id/1040276), [Samba Rsync News](https://download.samba.org/pub/rsync/src-previews/rsync-3.1.3pre1-NEWS).