CVE-2025-67901

5.3 MEDIUM

📋 TL;DR

This vulnerability in openrsync allows a client to crash the rsync server by sending specially crafted data with a zero-length block. The server fails to validate the relationship between two internal variables (p->rem and p->len), leading to a segmentation fault (SIGSEGV). This affects OpenBSD systems up to version 7.8 and any other platforms using openrsync through version 0.5.0.

💻 Affected Systems

Products:
  • openrsync
  • OpenBSD
Versions: openrsync through 0.5.0, OpenBSD through 7.8
Operating Systems: OpenBSD, Other platforms using openrsync
Default Config Vulnerable: ⚠️ Yes
Notes: Affects rsync server instances; clients are not vulnerable. Any configuration using openrsync as server is affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Denial of service causing rsync service disruption, potentially affecting data synchronization and backup operations.

🟠

Likely Case

Service interruption requiring manual restart of rsync daemon, disrupting file transfers.

🟢

If Mitigated

Minimal impact if rsync is monitored with automatic restart capabilities.

🌐 Internet-Facing: MEDIUM - Exploitable remotely but only causes DoS, not data compromise.
🏢 Internal Only: LOW - Internal attackers could disrupt rsync services but typically have better attack vectors.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept available in GitHub issue. Exploitation requires network access to rsync server port (default 873).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OpenBSD 7.9 and later, openrsync 0.5.1 and later

Vendor Advisory: https://github.com/kristapsdz/openrsync/issues/34

Restart Required: Yes

Instructions:

1. Update OpenBSD to version 7.9 or later. 2. For other systems, update openrsync to version 0.5.1 or later. 3. Restart rsync service after patching.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to rsync server to trusted IP addresses only.

Use firewall rules to limit access to rsync port (default 873)

Use Alternative rsync Implementation

linux

Replace openrsync with standard rsync implementation if possible.

Install rsync package from your distribution's repository

🧯 If You Can't Patch

  • Implement strict network segmentation to limit rsync server exposure
  • Monitor rsync service for crashes and implement automatic restart

🔍 How to Verify

Check if Vulnerable:

Check openrsync version with 'openrsync --version' or check OpenBSD version with 'uname -a'

Check Version:

openrsync --version 2>/dev/null || echo 'openrsync not installed'

Verify Fix Applied:

Verify version is OpenBSD >=7.9 or openrsync >=0.5.1

📡 Detection & Monitoring

Log Indicators:

  • rsync daemon crash logs
  • segmentation fault (SIGSEGV) messages in system logs

Network Indicators:

  • Unexpected connections to rsync port followed by service interruption

SIEM Query:

source="system_logs" AND ("rsync" AND ("segmentation fault" OR "SIGSEGV" OR "crash"))

🔗 References

📤 Share & Export