6.4
CVSSv2

CVE-2014-9512

Published: 12/02/2015 Updated: 28/07/2020
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

rsync 3.1.1 allows remote malicious users to write to arbitrary files via a symlink attack on a file in the synchronization path.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

samba rsync 3.1.1

opensuse opensuse 13.2

opensuse opensuse 13.1

oracle solaris 11.3

oracle solaris 10.0

Vendor Advisories

Debian Bug report logs - #778333 rsync: CVE-2014-9512 Package: rsync; Maintainer for rsync is Paul Slootman <paul@debianorg>; Source for rsync is src:rsync (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 13 Feb 2015 16:57:08 UTC Severity: important Tags: patch, security, upstream ...
rsync could be made to write files outside of the expected directory ...
It was discovered that rsync did not properly perform sanity checks on certain meta-information By sending specially crafted meta-information, a remote attacker could possibly exploit this flaw to cause an rsync endpoint to write data to files outside of the expected destination path ...