Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-12747

Опубликовано: 14 янв. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 5.6

Описание

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

РелизСтатусПримечание
devel

released

3.3.0+ds1-4
esm-infra-legacy/trusty

released

3.1.0-2ubuntu0.4+esm1
esm-infra/bionic

released

3.1.2-2.1ubuntu1.6+esm1
esm-infra/focal

released

3.1.3-8ubuntu0.8
esm-infra/xenial

released

3.1.1-3ubuntu1.3+esm3
focal

released

3.1.3-8ubuntu0.8
jammy

released

3.2.7-0ubuntu0.22.04.3
noble

released

3.2.7-1ubuntu1.1
oracular

released

3.3.0-1ubuntu0.1
trusty/esm

ignored

end of ESM support, was needed

Показывать по

EPSS

Процентиль: 4%
0.00021
Низкий

5.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.6
redhat
10 месяцев назад

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

CVSS3: 5.6
nvd
10 месяцев назад

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

CVSS3: 5.6
msrc
10 месяцев назад

Rsync: race condition in rsync handling symbolic links

CVSS3: 5.6
debian
10 месяцев назад

A flaw was found in rsync. This vulnerability arises from a race condi ...

suse-cvrf
8 месяцев назад

Security update for rsync

EPSS

Процентиль: 4%
0.00021
Низкий

5.6 Medium

CVSS3