rsync 3.1.3-development before 2017-10-24 mishandles archaic checksums, which makes it easier for remote attackers to bypass intended access restrictions. NOTE: the rsync development branch has significant use beyond the rsync developers, e.g., the code has been copied for use in various GitHub projects.
References
Configurations
History
21 Nov 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.samba.org/?p=rsync.git%3Ba=commit%3Bh=7b8a4ecd6ff9cdf4e5d3850ebf822f1e989255b3 - | |
References | () https://git.samba.org/?p=rsync.git%3Ba=commit%3Bh=9a480deec4d20277d8e20bc55515ef0640ca1e55 - | |
References | () https://git.samba.org/?p=rsync.git%3Ba=commit%3Bh=c252546ceeb0925eb8a4061315e3ff0a8c55b48b - |
07 Nov 2023, 02:40
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2017-10-29 06:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-15994
Mitre link : CVE-2017-15994
CVE.ORG link : CVE-2017-15994
JSON object : View
Products Affected
samba
- rsync
CWE
CWE-354
Improper Validation of Integrity Check Value