A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAXDIGESTLEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.
{
"cna_assigner": "redhat",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/12xxx/CVE-2024-12084.json",
"cwe_ids": [
"CWE-122"
]
}{
"source": "CPE_FIELD",
"cpe": [
"cpe:2.3:a:samba:rsync:3.2.7:-:*:*:*:*:*:*",
"cpe:2.3:a:samba:rsync:3.3.0:-:*:*:*:*:*:*"
],
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "3.2.7-NA"
},
{
"last_affected": "3.3.0-NA"
}
]
}{
"source": "AFFECTED_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "3.2.7"
},
{
"last_affected": "3.3.0"
}
]
}