Vulnerability Details : CVE-2014-2855
The check_secret function in authenticate.c in rsync 3.1.0 and earlier allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a user name which does not exist in the secrets file.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2014-2855
- cpe:2.3:a:samba:rsync:*:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.8.9:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.9.9:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.6.9:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.7.6:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.7.7:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.7.8:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.7.9:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.8.7:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.8.8:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:2.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:3.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:3.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:samba:rsync:3.0.8:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-2855
4.73%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-2855
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST |
CWE ids for CVE-2014-2855
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-2855
-
http://lists.opensuse.org/opensuse-updates/2014-05/msg00006.html
openSUSE-SU-2014:0595-1: moderate: Rsync: fixed remote denial of service
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:131
mandriva.com
-
http://www.ubuntu.com/usn/USN-2171-1
USN-2171-1: rsync vulnerability | Ubuntu security notices
-
https://bugs.launchpad.net/ubuntu/+source/rsync/+bug/1307230
Bug #1307230 “3.1.0 daemon infinite loop when no matched user in...” : Bugs : rsync package : Ubuntu
-
http://www.openwall.com/lists/oss-security/2014/04/14/5
oss-security - CVE Request: rsync denial of service
-
http://www.openwall.com/lists/oss-security/2014/04/15/1
oss-security - Re: CVE Request: rsync denial of service
-
https://bugzilla.samba.org/show_bug.cgi?id=10551
Bug 10551 – Daemon infinite loop when no matched user in secretsVendor Advisory
-
https://git.samba.org/?p=rsync.git;a=commit;h=0dedfbce2c1b851684ba658861fe9d620636c56a
git.samba.org - rsync.git/commit
-
http://advisories.mageia.org/MGASA-2015-0065.html
Mageia Advisory: MGASA-2015-0065 - Updated rsync package fixes security vulnerability
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131910.html
[SECURITY] Fedora 20 Update: rsync-3.1.0-3.fc20
Jump to