In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade rsync
to version 3.4.0 or higher.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow due to improper handling of attacker-controlled checksum lengths s2length
in the code.
An anonymous client can leverage this overflow, together with the stack memory exposure described in CVE-2024-12085 to execute code on an affected server.
Alternatively, a malicious rsync
server could gain read/write access to arbitrary files on a connected client.
This vulnerability can be avoided by compiling with CFLAGS=-DDISABLE_SHA512_DIGEST
and CFLAGS=-DDISABLE_SHA256_DIGEST
to disable SHA support.