First published: Thu Dec 05 2024(Updated: )
A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/rsync | <=3.2.3-4+deb11u1<=3.2.7-1 | 3.2.3-4+deb11u3 3.2.7-1+deb12u2 3.3.0+ds1-4 |
F5 BIG-IP and BIG-IQ Centralized Management |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-12086 is classified as a medium-severity vulnerability.
To fix CVE-2024-12086, upgrade the rsync package to version 3.2.3-4+deb11u3, 3.2.7-1+deb12u2, or 3.3.0+ds1-4.
CVE-2024-12086 affects versions of the rsync package up to and including 3.2.3-4+deb11u1 and 3.2.7-1.
The risk of CVE-2024-12086 is that it allows a server to enumerate the contents of arbitrary files from the client's machine.
Yes, CVE-2024-12086 can be exploited remotely if the affected rsync server is accessible over the network.