malicious
rsync client requires at least read access to the remote rsync module in order to trigger the issue.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 20 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rsync
Rsync rsync |
|
| Vendors & Products |
Rsync
Rsync rsync |
Wed, 19 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 18 Nov 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 18 Nov 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The malicious rsync client requires at least read access to the remote rsync module in order to trigger the issue. | |
| Title | Rsync: Out of bounds array access via negative index | |
| Weaknesses | CWE-129 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2025-11-19T16:48:56.591Z
Reserved: 2025-09-09T11:15:17.585Z
Link: CVE-2025-10158
Updated: 2025-11-19T16:15:07.191Z
Status : Awaiting Analysis
Published: 2025-11-18T15:16:25.433
Modified: 2025-11-19T19:15:16.750
Link: CVE-2025-10158
OpenCVE Enrichment
Updated: 2025-11-20T10:31:06Z