A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.
Metrics
Affected Vendors & Products
References
History
Wed, 15 Jan 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 14 Jan 2025 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 14 Jan 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 14 Jan 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client. | |
Title | Rsync: rsync server leaks arbitrary client files | |
First Time appeared |
Redhat
Redhat enterprise Linux Redhat openshift |
|
Weaknesses | CWE-390 | |
CPEs | cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat openshift |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2025-01-14T17:37:54.960Z
Updated: 2025-01-15T05:39:04.260Z
Reserved: 2024-12-03T08:57:58.397Z
Link: CVE-2024-12086
Vulnrichment
Updated: 2025-01-14T18:42:03.159Z
NVD
Status : Awaiting Analysis
Published: 2025-01-14T18:15:25.297
Modified: 2025-01-14T22:15:26.370
Link: CVE-2024-12086
Redhat