CVE-2014-2855

EUVD-2014-2879
The check_secret function in authenticate.c in rsync 3.1.0 and earlier allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a user name which does not exist in the secrets file.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 94%
Affected Products (NVD)
VendorProductVersion
sambarsync
𝑥
≤ 3.1.0
sambarsync
2.6.9
sambarsync
2.7.0
sambarsync
2.7.1
sambarsync
2.7.2
sambarsync
2.7.3
sambarsync
2.7.4
sambarsync
2.7.5
sambarsync
2.7.6
sambarsync
2.7.7
sambarsync
2.7.8
sambarsync
2.7.9
sambarsync
2.8.0
sambarsync
2.8.1
sambarsync
2.8.2
sambarsync
2.8.3
sambarsync
2.8.4
sambarsync
2.8.5
sambarsync
2.8.6
sambarsync
2.8.7
sambarsync
2.8.8
sambarsync
2.8.9
sambarsync
2.9.0
sambarsync
2.9.1
sambarsync
2.9.2
sambarsync
2.9.3
sambarsync
2.9.4
sambarsync
2.9.5
sambarsync
2.9.6
sambarsync
2.9.7
sambarsync
2.9.8
sambarsync
2.9.9
sambarsync
3.0.0
sambarsync
3.0.1
sambarsync
3.0.2
sambarsync
3.0.3
sambarsync
3.0.4
sambarsync
3.0.5
sambarsync
3.0.6
sambarsync
3.0.7
sambarsync
3.0.8
sambarsync
3.0.9
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
rsync
bookworm
3.2.7-1
fixed
bullseye
3.2.3-4+deb11u1
fixed
sid
3.3.0-1
fixed
squeeze
not-affected
trixie
3.3.0-1
fixed
wheezy
not-affected
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
rsync
lucid
not-affected
precise
not-affected
quantal
not-affected
saucy
not-affected
trusty
Fixed 3.1.0-2ubuntu0.1
released