Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-12747

Опубликовано: 14 янв. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 5.6

Описание

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

РелизСтатусПримечание
devel

released

3.3.0+ds1-4
esm-infra-legacy/trusty

released

3.1.0-2ubuntu0.4+esm1
esm-infra/bionic

released

3.1.2-2.1ubuntu1.6+esm1
esm-infra/focal

not-affected

3.1.3-8ubuntu0.8
esm-infra/xenial

released

3.1.1-3ubuntu1.3+esm3
focal

released

3.1.3-8ubuntu0.8
jammy

released

3.2.7-0ubuntu0.22.04.3
noble

released

3.2.7-1ubuntu1.1
oracular

released

3.3.0-1ubuntu0.1
trusty/esm

ignored

end of ESM support, was needed

Показывать по

EPSS

Процентиль: 1%
0.00013
Низкий

5.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.6
redhat
5 месяцев назад

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

CVSS3: 5.6
nvd
5 месяцев назад

A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.

CVSS3: 5.6
msrc
5 месяцев назад

Описание отсутствует

CVSS3: 5.6
debian
5 месяцев назад

A flaw was found in rsync. This vulnerability arises from a race condi ...

suse-cvrf
3 месяца назад

Security update for rsync

EPSS

Процентиль: 1%
0.00013
Низкий

5.6 Medium

CVSS3