Top file synchronization tool Rsync security flaws mean up to 660,000 servers possibly affected

A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
(Image credit: Shutterstock)

  • Rysinc was found to be vulnerable to at least six flaws
  • One of the bugs is a critical-severity RCE, experts warn
  • Users and vendors are advised to update to version 3.4.0 immediately

Rsync, a popular open source file transfer and synchronization tool has been found carrying multiple vulnerabilities that allowed threat actors to conduct all kinds of malicious activities, remote code execution (RCE) included. As a result, hundreds of thousands of endpoints are at serious risk.

The warning comes from multiple cybersecurity researchers, including those from Google Cloud, who recently discovered and reported the flaws.

“Two independent groups of researchers have identified a total of 6 vulnerabilities in rsync. In the most severe CVE, an attacker only requires anonymous read access to a rsync server, such as a public mirror, to execute arbitrary code on the machine the server is running on,” a security advisory published on Openwall reads. “Upstream has prepared patches for these CVEs. These fixes will be included in rsync 3.4.0 which is to be released shortly.”

Applying the fix

The most severe vulnerability is tracked as CVE-2024-12084, and is described as a heap buffer overflow bug arising from improper handling of checksum lengths in the Rsync daemon. It was given a severity score of 9.8, and said to affect versions 3.2.7 through < 3.4.0.

Other flaws are CVE-2024-12085 (information leak via uninitialized stack), CVE-2024-12086 (server leaks arbitrary client files), CVE-2024-12087 (path traversal), CVE-2024-12088 (bypass of –safe-links Option), and CVE-2024-12747 (symbolic link race condition).

The CERT Coordination Center (CERT/CC) labeled Red Hat, Arch, Gentoo, Ubuntu NixOS, AlmaLinux OS Foundation, and the Triton Data Center all as impacted, but added that there are “many more” potentially impacted projects and vendors.

"When combined, the first two vulnerabilities (heap buffer overflow and information leak) allow a client to execute arbitrary code on a device that has an Rsync server running," warned CERT/CC.

BleepingComputer also ran a quick Shodan scan which came back with 660,000 potentially affected instances. The majority (521,000) is located in China, with the remaining being split between the United States, Hong Kong, Korea, and Germany.

All Rsync users should upgrade to version 3.4.0 as soon as possible, or at least block TCP port 873.

You might also like

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Read more
Digital image of a lock.
QNAP says it has fixed several major vulnerabilities in NAS backup, recovery app
Representational image depecting cybersecurity protection
OpenSSH vulnerabilities could pose huge threat to businesses everywhere
A person&#039;s fingers type at a keyboard, with a digital security screen with a lock on it overlaid.
Veeam backup software has a serious security flaw - here's how to stay safe
Ransomware
Synology patches critical vulnerabilities, urges users to update devices against zero-click attacks
The best free firewall
Sophos hotfixes remote code execution vulnerabilities in Firewall
Avast cybersecurity
Hackers are hijacking government software to access sensitive servers
Latest in Security
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
A worrying Apple Password App vulnerability reportedlyleft users exposed for months
DeepSeek
Fake DeepSeek installers are infecting your device with dangerous malware
AI tools.
Not even fairy tales are safe - researchers weaponise bedtime stories to jailbreak AI chatbots and create malware
Data leak
Top California sperm bank suffers embarrassing leak
An Android phone being held in the hand
These malicious Android apps were installed over 60 million times - here's how to stay safe
ransomware avast
Billions of credentials were stolen from businesses around the world in 2024
Latest in News
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
A worrying Apple Password App vulnerability reportedlyleft users exposed for months
Google Pixel 9a
Google is delaying the Pixel 9a to fix a mystery “component quality issue”
The bottom left corner of an Android phone, showing the Phone, Messages, Google icons and Google Search bar
Google Messages remote delete will soon save you from texting embarrassment – and here's how it works
ExpressVPN mobile app and Aircove
ExpressVPN ‘reduces workforce’ for the second time in two years
The Nanoleaf PC Screen Mirror Lightstrip being used on a desktop computer.
Mac gaming could get an intriguing boost – but not in the way you'd expect
Snapdragon G Series
Qualcomm poised to muscle in on AMD's territory with powerful gaming handheld processors