This security bulletin contains one low risk vulnerability.
The vulnerability allows a remote server to perform directory traversal attacks.
The vulnerability exists due to input validation error within the rsync client when processing file names. A remote malicious server overwrite arbitrary files in the rsync client target directory and subdirectories on the connected peer.Mitigation
Install update from vendor's website.Vulnerable software versions
Rsync: 3.2.0 - 3.2.4pre4Fixed software versions
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?