Описание
librsync before 1.0.0 uses a truncated MD4 checksum to match blocks, which makes it easier for remote attackers to modify transmitted data via a birthday attack.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | ignored | end of standard support, was needed |
| cosmic | ignored | end of life |
| devel | not-affected | 2.0.2-1 |
| disco | ignored | end of life |
| eoan | not-affected | 2.0.2-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
| esm-infra/bionic | needed | |
| esm-infra/focal | not-affected | 2.0.2-1 |
| esm-infra/xenial | needed |
Показывать по
10
5.8 Medium
CVSS2
Связанные уязвимости
nvd
больше 10 лет назад
librsync before 1.0.0 uses a truncated MD4 checksum to match blocks, which makes it easier for remote attackers to modify transmitted data via a birthday attack.
debian
больше 10 лет назад
librsync before 1.0.0 uses a truncated MD4 checksum to match blocks, w ...
github
больше 3 лет назад
librsync before 1.0.0 uses a truncated MD4 checksum to match blocks, which makes it easier for remote attackers to modify transmitted data via a birthday attack.
5.8 Medium
CVSS2