Project Subscriptions
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6282-1 | rsync security update |
Ubuntu USN |
USN-8283-1 | rsync vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 21 May 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Samba
Samba rsync |
|
| CPEs | cpe:2.3:a:samba:rsync:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Samba
Samba rsync |
Thu, 21 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 20 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rsync Project
Rsync Project rsync |
|
| Vendors & Products |
Rsync Project
Rsync Project rsync |
Wed, 20 May 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rsync versions before 3.4.3 contain an off-by-one out-of-bounds stack write vulnerability in the establish_proxy_connection() function in socket.c that allows network attackers to corrupt stack memory by sending a malformed HTTP proxy response. Attackers can exploit this by positioning themselves between the client and proxy or controlling the proxy server to send a response line of 1023 or more bytes without a newline terminator, causing a null byte to be written to an out-of-bounds stack address when the RSYNC_PROXY environment variable is set. | |
| Title | Rsync < 3.4.3 Off-by-One Stack Write via HTTP Proxy | |
| Weaknesses | CWE-193 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-20T17:31:52.358Z
Reserved: 2026-05-11T14:14:49.612Z
Link: CVE-2026-45232
Updated: 2026-05-20T17:30:48.307Z
Status : Analyzed
Published: 2026-05-20T02:16:36.887
Modified: 2026-05-21T20:52:56.780
Link: CVE-2026-45232
OpenCVE Enrichment
Updated: 2026-05-20T10:38:43Z
Debian DSA
Ubuntu USN