CVE-2018-5764

NameCVE-2018-5764
DescriptionThe parse_arguments function in options.c in rsyncd in rsync before 3.1.3 does not prevent multiple --protect-args uses, which allows remote attackers to bypass an argument-sanitization protection mechanism.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1247-1, DLA-1725-1
NVD severitymedium (attack range: remote)
Debian Bugs887588

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rsync (PTS)jessie3.1.1-3+deb8u1vulnerable
jessie (security)3.1.1-3+deb8u2fixed
stretch3.1.2-1+deb9u2vulnerable
stretch (security)3.1.2-1+deb9u1vulnerable
bullseye, sid, buster3.1.3-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
rsyncsource(unstable)3.1.2-2.2medium887588
rsyncsourcejessie3.1.1-3+deb8u2mediumDLA-1725-1
rsyncsourcewheezy3.0.9-4+deb7u2mediumDLA-1247-1

Notes

[stretch] - rsync <no-dsa> (Minor issue)
https://git.samba.org/rsync.git/?p=rsync.git;a=commit;h=7706303828fcde524222babb2833864a4bd09e07

Search for package or bug name: Reporting problems