| ID |
CVE-2026-45232
|
| Sažetak |
Rsync versions before 3.4.3 contain an off-by-one out-of-bounds stack write vulnerability in the establish_proxy_connection() function in socket.c that allows network attackers to corrupt stack memory by sending a malformed HTTP proxy response. Attackers can exploit this by positioning themselves between the client and proxy or controlling the proxy server to send a response line of 1023 or more bytes without a newline terminator, causing a null byte to be written to an out-of-bounds stack address when the RSYNC_PROXY environment variable is set. |
| Reference |
|
| CVSS |
| Base: | 3.1 |
| Impact: | 1.4 |
| Exploitability: | 1.6 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
HIGH |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| NONE |
NONE |
LOW |
|
| CVSS vektor |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L |
| Zadnje važnije ažuriranje |
21-05-2026 - 20:52 |
| Objavljeno |
20-05-2026 - 02:16 |