First published: Thu Dec 05 2024(Updated: )
A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/rsync | <=3.2.7-1 | 3.2.3-4+deb11u1 3.2.3-4+deb11u3 3.2.7-1+deb12u2 3.3.0+ds1-4 |
F5 BIG-IP and BIG-IQ Centralized Management |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-12084 is classified as a high-severity vulnerability due to its potential for exploitation and impact on system integrity.
To fix CVE-2024-12084, upgrade to the patched versions of rsync, which include 3.2.3-4+deb11u1, 3.2.3-4+deb11u3, 3.2.7-1+deb12u2, or 3.3.0+ds1-4.
Exploitation of CVE-2024-12084 can lead to a heap-based buffer overflow, resulting in arbitrary code execution on the affected system.
CVE-2024-12084 affects rsync versions up to and including 3.2.7-1.
CVE-2024-12084 primarily affects the rsync daemon used in Debian-based systems.