CVE-2024-12084Heap-based Buffer Overflow in Samba Rsync

Severity
9.8CRITICALNVD
EPSS
3.5%
top 12.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 15
Latest updateFeb 6

Description

A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages5 packages

Debiansamba/rsync< 3.2.7-1+deb12u1+2
Ubuntusamba/rsync< 3.1.3-8ubuntu0.9+13
NVDsamba/rsync3.2.7, 3.3.0+1
NVDnixos/nixos< 24.11+1
NVDtritondatacenter/smartos< 20250123

Also affects: Almalinux 10.0, Enterprise Linux 10.0

🔴Vulnerability Details

7
OSV
rsync regression2025-02-10
OSV
rsync vulnerabilities2025-01-28
OSV
rsync regression2025-01-16
CVEList
Rsync: heap buffer overflow in rsync due to improper checksum length handling2025-01-15
OSV
CVE-2024-12084: A heap-based buffer overflow flaw was found in the rsync daemon2025-01-15

🔍Detection Rules

2
Suricata
ET EXPLOIT Samba rsync s2length Checksum Length Heap Buffer Overflow (CVE-2024-12084)2026-02-06
Sigma
Suspicious Invocation of Shell via Rsync

📋Vendor Advisories

7
Ubuntu
rsync regression2025-02-10
Ubuntu
rsync vulnerabilities2025-01-28
Ubuntu
rsync regression2025-01-16
Microsoft
Rsync: heap buffer overflow in rsync due to improper checksum length handling2025-01-14
Ubuntu
rsync vulnerabilities2025-01-14