Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-17434

Опубликовано: 04 дек. 2017
Источник: redhat
CVSS3: 4.8

Описание

The daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, does not check for fnamecmp filenames in the daemon_filter_list data structure (in the recv_files function in receiver.c) and also does not apply the sanitize_paths protection mechanism to pathnames found in "xname follows" strings (in the read_ndx_and_attrs function in rsync.c), which allows remote attackers to bypass intended access restrictions.

Отчет

Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5rsyncWill not fix
Red Hat Enterprise Linux 6rsyncWill not fix
Red Hat Enterprise Linux 7rsyncWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=1522875rsync: daemon does not check for fnamecmp filenames allowing for access restriction bypass

4.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 8 лет назад

The daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, does not check for fnamecmp filenames in the daemon_filter_list data structure (in the recv_files function in receiver.c) and also does not apply the sanitize_paths protection mechanism to pathnames found in "xname follows" strings (in the read_ndx_and_attrs function in rsync.c), which allows remote attackers to bypass intended access restrictions.

CVSS3: 9.8
nvd
около 8 лет назад

The daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, does not check for fnamecmp filenames in the daemon_filter_list data structure (in the recv_files function in receiver.c) and also does not apply the sanitize_paths protection mechanism to pathnames found in "xname follows" strings (in the read_ndx_and_attrs function in rsync.c), which allows remote attackers to bypass intended access restrictions.

CVSS3: 9.8
debian
около 8 лет назад

The daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, do ...

CVSS3: 9.8
github
больше 3 лет назад

The daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, does not check for fnamecmp filenames in the daemon_filter_list data structure (in the recv_files function in receiver.c) and also does not apply the sanitize_paths protection mechanism to pathnames found in "xname follows" strings (in the read_ndx_and_attrs function in rsync.c), which allows remote attackers to bypass intended access restrictions.

CVSS3: 9.8
fstec
около 8 лет назад

Уязвимость функций recv_files и read_ndx_and_attrs демона rsync, позволяющая нарушителю обойти существующие ограничения доступа и оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

4.8 Medium

CVSS3