445
VMScore

CVE-2018-5764

Published: 17/01/2018 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The parse_arguments function in options.c in rsyncd in rsync prior to 3.1.3 does not prevent multiple --protect-args uses, which allows remote malicious users to bypass an argument-sanitization protection mechanism.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

samba rsync

debian debian linux 8.0

debian debian linux 7.0

debian debian linux 9.0

canonical ubuntu linux 16.04

canonical ubuntu linux 14.04

canonical ubuntu linux 17.10

Vendor Advisories

Debian Bug report logs - #887588 rsync: CVE-2018-5764 Package: src:rsync; Maintainer for src:rsync is Paul Slootman <paul@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 18 Jan 2018 09:21:01 UTC Severity: important Tags: fixed-upstream, security, upstream Found in version rsync/312-1 ...
Several security issues were fixed in rsync ...
Several security issues were fixed in rsync ...
The parse_arguments function in optionsc in rsyncd in rsync before 313 does not prevent multiple --protect-args uses, which allows remote attackers to bypass an argument-sanitization protection mechanism ...
The parse_arguments function in optionsc in rsyncd in rsync before 313 does not prevent multiple --protect-args uses, which allows remote attackers to bypass an argument-sanitization protection mechanism ...
ProductsSolutionsSupport and ServicesCompanyHow To BuySupport PortalGo To PortalRegisterForgot Username/Password?English日本語中文</form> {"@context":"schemaorg/","@type":"BreadcrumbList","url":"wwwbroadcomcom/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2074","numberOfItems":5,"itemLi ...