Rsync version 3.4.2 and prior contain an integer overflow vulnerability in the compressed-token decoder where a 32-bit signed counter is not checked for overflow, allowing a malicious sender to trigger an overflow that causes the receiver process to read and return data from outside the intended buffer bounds. Attackers can exploit this vulnerability to disclose process memory contents including environment variables, passwords, heap and stack data, and library memory pointers, significantly reducing ASLR effectiveness and facilitating further exploitation.
https://www.vulncheck.com/advisories/rsync-integer-overflow-information-disclosure
https://github.com/RsyncProject/rsync/security/advisories/GHSA-g37v-g3gj-pmwq
Published: 2026-05-20
Updated: 2026-05-20
Base Score: 8.5
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:N/A:C
Severity: High
Base Score: 8.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Severity: High
Base Score: 6.1
Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
Severity: Medium