First published: Thu Sep 03 2020(Updated: )
A flaw was found in rsync in versions since 3.2.0pre1. Rsync improperly validates certificate with host mismatch vulnerability. A remote, unauthenticated attacker could exploit the flaw by performing a man-in-the-middle attack using a valid certificate for another hostname which could compromise confidentiality and integrity of data transmitted using rsync-ssl. The highest threat from this vulnerability is to data confidentiality and integrity. This flaw affects rsync versions before 3.2.4.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rsync | <3.2.4 | 3.2.4 |
Samba Rsync | >=3.2.1<3.2.4 | |
Samba Rsync | =3.2.0 | |
Samba Rsync | =3.2.0-pre1 | |
Samba Rsync | =3.2.0-pre2 | |
Samba Rsync | =3.2.0-pre3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14387 is a vulnerability in rsync versions since 3.2.0pre1 that allows a remote, unauthenticated attacker to perform a man-in-the-middle attack using a valid certificate for another hostname.
The severity of CVE-2020-14387 is high, with a CVSS score of 7.4.
CVE-2020-14387 affects rsync versions since 3.2.0pre1.
To fix CVE-2020-14387, update rsync to version 3.2.4 or later.
You can find more information about CVE-2020-14387 at the following references: [Reference 1](https://bugzilla.redhat.com/show_bug.cgi?id=1875549), [Reference 2](https://git.samba.org/?p=rsync.git;a=commit;h=c3f7414), [Reference 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1875550).