CVE-2014-2855

CVSS V2 High 7.8 CVSS V3 None
Description
The check_secret function in authenticate.c in rsync 3.1.0 and earlier allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a user name which does not exist in the secrets file.
Overview
  • CVE ID
  • CVE-2014-2855
  • Assigner
  • security@ubuntu.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2014-04-23T15:55:04
  • Last Modified Date
  • 2017-12-16T02:29:06
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:samba:rsync:*:*:*:*:*:*:*:* 1 OR 3.1.0
cpe:2.3:a:samba:rsync:2.6.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.7.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.7.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.7.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.7.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.7.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.7.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.7.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.7.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.7.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.8.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.8.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.8.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.8.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.8.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.8.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.8.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.8.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.8.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.8.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.9.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.9.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.9.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.9.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.9.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.9.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.9.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.9.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.9.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:2.9.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:3.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:3.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:3.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:3.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:3.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:3.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:3.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:3.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:3.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:rsync:3.0.9:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:N/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 7.8
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.9
History
Created Old Value New Value Data Type Notes
2022-05-10 08:08:45 Added to TrackCVE
2022-12-01 22:50:28 2014-04-23T15:55Z 2014-04-23T15:55:04 CVE Published Date updated
2022-12-01 22:50:28 2017-12-16T02:29:06 CVE Modified Date updated
2022-12-01 22:50:28 Modified Vulnerability Status updated