CVE-2026-45232 PUBLISHED

Rsync < 3.4.3 Off-by-One Stack Write via HTTP Proxy

Assigner: VulnCheck
Reserved: 11.05.2026 Published: 20.05.2026 Updated: 20.05.2026

Rsync versions before 3.4.3 contain an off-by-one out-of-bounds stack write vulnerability in the establish_proxy_connection() function in socket.c that allows network attackers to corrupt stack memory by sending a malformed HTTP proxy response. Attackers can exploit this by positioning themselves between the client and proxy or controlling the proxy server to send a response line of 1023 or more bytes without a newline terminator, causing a null byte to be written to an out-of-bounds stack address when the RSYNC_PROXY environment variable is set.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
CVSS Score: 2.1

Product Status

Vendor RsyncProject
Product rsync
Versions Default: unaffected
  • affected from 0 to 3.4.3 (excl.)

Credits

  • Michal Ruprich finder

References

Problem Types

  • Off-by-one Error CWE