Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-5764

Опубликовано: 17 янв. 2018
Источник: redhat
CVSS3: 6.3
EPSS Низкий

Описание

The parse_arguments function in options.c in rsyncd in rsync before 3.1.3 does not prevent multiple --protect-args uses, which allows remote attackers to bypass an argument-sanitization protection mechanism.

Отчет

This issue affects the versions of rsync as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 6. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5rsyncWill not fix
Red Hat Enterprise Linux 6rsyncWill not fix
Red Hat Enterprise Linux 7rsyncWill not fix
Red Hat Enterprise Linux 8rsyncNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-77
https://bugzilla.redhat.com/show_bug.cgi?id=1536661rsync: sanitization bypass in parse_argument in options.c

EPSS

Процентиль: 93%
0.09757
Низкий

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 8 лет назад

The parse_arguments function in options.c in rsyncd in rsync before 3.1.3 does not prevent multiple --protect-args uses, which allows remote attackers to bypass an argument-sanitization protection mechanism.

CVSS3: 7.5
nvd
около 8 лет назад

The parse_arguments function in options.c in rsyncd in rsync before 3.1.3 does not prevent multiple --protect-args uses, which allows remote attackers to bypass an argument-sanitization protection mechanism.

CVSS3: 7.5
debian
около 8 лет назад

The parse_arguments function in options.c in rsyncd in rsync before 3. ...

suse-cvrf
почти 8 лет назад

Security update for rsync

suse-cvrf
около 8 лет назад

Security update for rsync

EPSS

Процентиль: 93%
0.09757
Низкий

6.3 Medium

CVSS3