| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6282-1 | rsync security update |
Ubuntu USN |
USN-8283-1 | rsync vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 20 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rsync Project
Rsync Project rsync |
|
| Vendors & Products |
Rsync Project
Rsync Project rsync |
Wed, 20 May 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rsync versionĀ 3.4.2 and prior contain an integer overflow vulnerability in the compressed-token decoder where a 32-bit signed counter is not checked for overflow, allowing a malicious sender to trigger an overflow that causes the receiver process to read and return data from outside the intended buffer bounds. Attackers can exploit this vulnerability to disclose process memory contents including environment variables, passwords, heap and stack data, and library memory pointers, significantly reducing ASLR effectiveness and facilitating further exploitation. | |
| Title | Rsync < 3.4.3 Integer Overflow Information Disclosure | |
| Weaknesses | CWE-125 CWE-190 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-20T13:04:03.282Z
Reserved: 2026-05-01T18:22:45.639Z
Link: CVE-2026-43618
Updated: 2026-05-20T13:03:58.676Z
Status : Awaiting Analysis
Published: 2026-05-20T02:16:36.410
Modified: 2026-05-20T13:58:07.923
Link: CVE-2026-43618
No data.
OpenCVE Enrichment
Updated: 2026-05-20T10:38:39Z
Debian DSA
Ubuntu USN