Description
The recv_files function in receiver.c in the daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, proceeds with certain file metadata updates before checking for a filename in the daemon_filter_list data structure, which allows remote attackers to bypass intended access restrictions.
CVSS vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 2.2 | Impact: 1.4Attack Vector: Network
Complexity: High
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: None
Integrity: Low
Availability: None
Affected Packages3 packages
Also affects: Debian Linux 7.0, 8.0, 9.0
🔴Vulnerability Details
4GHSAGHSA-wg8h-hh94-gpv6: The recv_files function in receiver↗2022-05-13 ▶ OSVrsync vulnerabilities↗2017-12-07 ▶ OSVCVE-2017-17433: The recv_files function in receiver↗2017-12-06 ▶ CVEListCVE-2017-17433: The recv_files function in receiver↗2017-12-06 ▶ 📋Vendor Advisories
4Ubuntursync vulnerabilities↗2017-12-07 ▶ Ubuntursync vulnerabilities↗2017-12-07 ▶ Red Hatrsync: recv_files function metadata handling allows for access restriction bypass↗2017-12-04 ▶ DebianCVE-2017-17433: rsync - The recv_files function in receiver.c in the daemon in rsync 3.1.2, and 3.1.3-de...↗2017 ▶ 💬Community
2BugzillaCVE-2017-17433 rsync: recv_files function metadata handling allows for access restriction bypass↗2017-12-06 ▶ BugzillaCVE-2017-15994 CVE-2017-16548 CVE-2017-17433 CVE-2017-17434 rsync: various flaws [fedora-all]↗2017-11-09 ▶