RSYNC: Rsync Daemon Checksum Handling Heap-based Buffer Overflow

This signature detects attempts to exploit a known vulnerability against Rsync. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the Rsync.

Extended Description

A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.

Short Name
RSYNC:DAEMON-CHKSM-HEAPOF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
RSYNC
Keywords
Buffer CVE-2024-12084 CVE-2024-12085 Checksum Daemon Handling Heap-based Overflow Rsync
Release Date
05/30/2025
Supported Platforms

srx-branch-19.3

vsrx3bsd-19.2

srx-19.4

vsrx3bsd-19.4

srx-branch-19.4

vsrx-19.4

vsrx-19.2

srx-19.3

Sigpack Version
3816
False Positive
Unknown

Found a potential security threat?