Vulnerability identifier: #VU66189
Vulnerability risk: Low
Exploitation vector: Network
Exploit availability: No
Server applications / Other server solutions
The vulnerability allows a remote server to perform directory traversal attacks.
The vulnerability exists due to input validation error within the rsync client when processing file names. A remote malicious server overwrite arbitrary files in the rsync client target directory and subdirectories on the connected peer.
Install update from vendor's website.
Vulnerable software versions
Rsync: 3.2.0 - 3.2.4pre4
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?