malicious
rsync client requires at least read access to the remote rsync module in order to trigger the issue.
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 20 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rsync
Rsync rsync |
|
| Vendors & Products |
Rsync
Rsync rsync |
Wed, 19 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 18 Nov 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 18 Nov 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The malicious rsync client requires at least read access to the remote rsync module in order to trigger the issue. | |
| Title | Rsync: Out of bounds array access via negative index | |
| Weaknesses | CWE-129 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2025-11-19T16:48:56.591Z
Reserved: 2025-09-09T11:15:17.585Z
Link: CVE-2025-10158
Updated: 2025-11-19T16:15:07.191Z
Status : Awaiting Analysis
Published: 2025-11-18T15:16:25.433
Modified: 2025-11-19T19:15:16.750
Link: CVE-2025-10158
OpenCVE Enrichment
Updated: 2025-11-20T10:31:06Z