CVE-2024-12085

HIGH
2025-01-14 [email protected]
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

4
Patch Released
Apr 02, 2026 - 14:30 nvd
Patch available
Analysis Generated
Mar 28, 2026 - 18:03 vuln.today
PoC Detected
Nov 20, 2025 - 21:15 vuln.today
Public exploit code
CVE Published
Jan 14, 2025 - 18:15 nvd
HIGH 7.5

Description

A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time.

Analysis

A flaw was found in rsync which could be triggered when rsync compares file checksums. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 19.1%.

Technical Context

This vulnerability is classified as Use of Uninitialized Resource (CWE-908), which allows attackers to access uninitialized memory causing crashes or information disclosure. A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time. Affected products include: Samba Rsync, Redhat Openshift, Redhat Openshift Container Platform, Redhat Enterprise Linux, Redhat Enterprise Linux Eus.

Affected Products

Samba Rsync, Redhat Openshift, Redhat Openshift Container Platform, Redhat Enterprise Linux, Redhat Enterprise Linux Eus.

Remediation

No vendor patch is available at time of analysis. Monitor vendor advisories for updates. Initialize all variables, use compiler warnings for uninitialized access, use memory-safe languages.

Priority Score

77
Low Medium High Critical
KEV: 0
EPSS: +19.1
CVSS: +38
POC: +20

Vendor Status

Share

CVE-2024-12085 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy