Vulnerability Details CVE-2017-16548
The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing '\0' character in an xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to the daemon.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.033
EPSS Ranking 86.8%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2017-16548
-
cpe:2.3:a:samba:rsync:3.0.0
-
cpe:2.3:a:samba:rsync:3.0.1
-
cpe:2.3:a:samba:rsync:3.0.2
-
cpe:2.3:a:samba:rsync:3.0.3
-
cpe:2.3:a:samba:rsync:3.0.4
-
cpe:2.3:a:samba:rsync:3.0.5
-
cpe:2.3:a:samba:rsync:3.0.6
-
cpe:2.3:a:samba:rsync:3.0.7
-
cpe:2.3:a:samba:rsync:3.0.8
-
cpe:2.3:a:samba:rsync:3.0.9
-
cpe:2.3:a:samba:rsync:3.1.0
-
cpe:2.3:a:samba:rsync:3.1.1
-
cpe:2.3:a:samba:rsync:3.1.2
-
cpe:2.3:o:canonical:ubuntu_linux:12.04
-
cpe:2.3:o:canonical:ubuntu_linux:14.04
-
cpe:2.3:o:canonical:ubuntu_linux:16.04
-
cpe:2.3:o:canonical:ubuntu_linux:17.10
-
cpe:2.3:o:debian:debian_linux:7.0
-
cpe:2.3:o:debian:debian_linux:8.0
-
cpe:2.3:o:debian:debian_linux:9.0