CVE-2024-12084
Published: 15 January 2025
Description
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Security Summary
CVE-2024-12084 is a heap-based buffer overflow vulnerability in the rsync daemon, stemming from improper handling of attacker-controlled checksum lengths (s2length) in the code. The flaw occurs when MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH of 16 bytes, allowing an attacker to write out of bounds in the sum2 buffer. It is associated with CWE-122 (Heap-based Buffer Overflow) and CWE-787 (Out-of-bounds Write), and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity.
The vulnerability can be exploited by a remote attacker with network access to the rsync daemon, requiring no privileges, low complexity, and no user interaction. Exploitation enables out-of-bounds writes in heap memory, potentially compromising confidentiality, integrity, and availability to a high degree.
Red Hat has issued advisory errata RHBA-2025:6470 to address the issue, with further details in their CVE security page, Bugzilla entry #2330527, CERT vulnerability note 952657, and an oss-security mailing list announcement from January 14, 2025.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Heap buffer overflow and related flaws in rsync daemon enable remote code execution on servers via anonymous client access (T1068, T1190, T1210); file leak vulnerability facilitates collection of arbitrary data from clients' local systems (T1005).