CVE-2017-17433
Published: August 31, 2023Last modified: August 31, 2023
Description
The recv_files function in receiver.c in the daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, proceeds with certain file metadata updates before checking for a filename in the daemon_filter_list data structure, which allows remote attackers to bypass intended access restrictions.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 3.7 |
Attack Vector | NETWORK |
Attack complexity | HIGH |
Privileges required | NONE |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | NONE |
Integrity impact | LOW |
Availability impact | NONE |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | rsync | Not affected (3.2.7-r0) |
Stream | rsync | Not affected (3.2.7-r4) |
References
- http://security.cucumberlinux.com/security/details.php?id=169
- https://bugzilla.redhat.com/show_bug.cgi?id=1522874#c4
- https://git.samba.org/?p=rsync.git%3Ba=commit%3Bh=3e06d40029cfdce9d0f73d87cfd4edaf54be9c51
- https://git.samba.org/?p=rsync.git;a=commit;h=3e06d40029cfdce9d0f73d87cfd4edaf54be9c51
- https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html
- https://www.debian.org/security/2017/dsa-4068