Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-2855

Опубликовано: 13 апр. 2014
Источник: redhat
CVSS2: 4.3
EPSS Средний

Описание

The check_secret function in authenticate.c in rsync 3.1.0 and earlier allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a user name which does not exist in the secrets file.

Отчет

Not vulnerable. This issue did not affect the versions of rsync as shipped with Red Hat Enterprise Linux 5 and 6.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5rsyncNot affected
Red Hat Enterprise Linux 6rsyncNot affected
Red Hat Enterprise Linux 7rsyncNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1087841rsync: CPU consumption denial of service when authenticating with a non-existent username

EPSS

Процентиль: 95%
0.17189
Средний

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 12 лет назад

The check_secret function in authenticate.c in rsync 3.1.0 and earlier allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a user name which does not exist in the secrets file.

nvd
почти 12 лет назад

The check_secret function in authenticate.c in rsync 3.1.0 and earlier allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a user name which does not exist in the secrets file.

debian
почти 12 лет назад

The check_secret function in authenticate.c in rsync 3.1.0 and earlier ...

github
больше 3 лет назад

The check_secret function in authenticate.c in rsync 3.1.0 and earlier allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a user name which does not exist in the secrets file.

EPSS

Процентиль: 95%
0.17189
Средний

4.3 Medium

CVSS2