Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-12084


A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.


Published

2025-01-15T15:15:10.537

Last Modified

2025-07-08T04:15:35.820

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

Weaknesses
  • Type: Secondary
    CWE-122
  • Type: Primary
    CWE-787

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application samba rsync 3.2.7 Yes
Application samba rsync 3.3.0 Yes
Operating System almalinux almalinux 10.0 Yes
Operating System archlinux arch_linux - Yes
Operating System gentoo linux - Yes
Operating System nixos nixos < 24.11 Yes
Operating System nixos nixos 24.11 Yes
Operating System novell suse_linux - Yes
Operating System tritondatacenter smartos < 20250123 Yes
Operating System redhat enterprise_linux 10.0 Yes

References