Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-12747

Опубликовано: 14 янв. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 5.6

Описание

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

РелизСтатусПримечание
devel

released

3.3.0+ds1-4
esm-infra-legacy/trusty

released

3.1.0-2ubuntu0.4+esm1
esm-infra/bionic

released

3.1.2-2.1ubuntu1.6+esm1
esm-infra/focal

released

3.1.3-8ubuntu0.8
esm-infra/xenial

released

3.1.1-3ubuntu1.3+esm3
focal

released

3.1.3-8ubuntu0.8
jammy

released

3.2.7-0ubuntu0.22.04.3
noble

released

3.2.7-1ubuntu1.1
oracular

released

3.3.0-1ubuntu0.1
trusty/esm

ignored

end of ESM support, was needed

Показывать по

EPSS

Процентиль: 5%
0.00022
Низкий

5.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.6
redhat
около 1 года назад

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

CVSS3: 5.6
nvd
около 1 года назад

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

CVSS3: 5.6
msrc
около 1 года назад

Rsync: race condition in rsync handling symbolic links

CVSS3: 5.6
debian
около 1 года назад

A flaw was found in rsync. This vulnerability arises from a race condi ...

suse-cvrf
11 месяцев назад

Security update for rsync

EPSS

Процентиль: 5%
0.00022
Низкий

5.6 Medium

CVSS3