Top file synchronization tool Rsync security flaws mean up to 660,000 servers possibly affected

Posted by:
James Thompson
Sat, 18 Jan
0 Comment
Feature image

A critical security advisory has been issued for Rsync, a widely used open source file transfer and synchronization tool, after the discovery of multiple vulnerabilities that could potentially lead to malicious activities, including remote code execution (RCE). Cybersecurity researchers, including experts from Google Cloud, have identified at least six flaws in Rsync, with one of the most severe being a heap buffer overflow bug (CVE-2024-12084) that could allow attackers to execute arbitrary code by exploiting improper handling of checksum lengths. Other vulnerabilities identified include information leaks, arbitrary file leaks, path traversal, bypass of certain safety options, and a symbolic link race condition, affecting versions 3.2.7 through <3.4.0.

The security community has urged users and vendors to promptly update to version 3.4.0 to mitigate the risks posed by these vulnerabilities. Major projects and vendors such as Red Hat, Arch, Gentoo, Ubuntu NixOS, AlmaLinux OS Foundation, and the Triton Data Center have been flagged as impacted, with many more potentially affected. CERT Coordination Center (CERT/CC) highlighted the critical nature of these flaws, emphasizing the need for immediate action to prevent unauthorized code execution on servers running Rsync. A Shodan scan revealed over 660,000 instances at risk, with a significant number located in China.

To safeguard against potential exploits, users are advised to upgrade to version 3.4.0 without delay or consider blocking TCP port 873. Stay proactive in securing your systems and preventing security breaches in the ever-evolving threat landscape.

Tags:

0 0 votes
Article Rating
Subscribe
Notify of
guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments