Exploit maturity not defined.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade rsync
to version 3.4.0 or higher.
Affected versions of this package are vulnerable to Out-of-Bounds Read when rsync compares file checksums.
An anonymous client can leverage this overflow, together with the heap-based buffer overflow described in CVE-2024-12084 to execute code on an affected server.
Alternatively, a malicious rsync
server could gain read/write access to arbitrary files on a connected client.
This vulnerability can be avoided by compiling with -ftrivial-auto-var-init=zero
.