A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The

malicious

rsync client requires at least read access to the remote rsync module in order to trigger the issue.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 20 Nov 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Rsync
Rsync rsync
Vendors & Products Rsync
Rsync rsync

Wed, 19 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 19 Nov 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 18 Nov 2025 15:00:00 +0000


Tue, 18 Nov 2025 14:30:00 +0000

Type Values Removed Values Added
Description A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The malicious rsync client requires at least read access to the remote rsync module in order to trigger the issue.
Title Rsync: Out of bounds array access via negative index
Weaknesses CWE-129
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: rapid7

Published:

Updated: 2025-11-19T16:48:56.591Z

Reserved: 2025-09-09T11:15:17.585Z

Link: CVE-2025-10158

cve-icon Vulnrichment

Updated: 2025-11-19T16:15:07.191Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-18T15:16:25.433

Modified: 2025-11-19T19:15:16.750

Link: CVE-2025-10158

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-11-18T14:24:19Z

Links: CVE-2025-10158 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-11-20T10:31:06Z

Weaknesses