<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Rsync — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/rsync/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 13:17:51 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/rsync/feed.xml" rel="self" type="application/rss+xml"/><item><title>Rsync TOCTOU Vulnerability Allows File Write Redirection</title><link>https://feed.craftedsignal.io/briefs/2026-05-rsync-toctou/</link><pubDate>Wed, 20 May 2026 13:17:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-rsync-toctou/</guid><description>Rsync versions before 3.4.3 are vulnerable to a TOCTOU race condition allowing attackers with write access to a module path to redirect file writes outside intended directories by replacing parent directory components with symbolic links, potentially leading to privilege escalation when the daemon runs with elevated privileges and chroot is disabled.</description><content:encoded><![CDATA[<p>Rsync before version 3.4.3 is susceptible to a time-of-check to time-of-use (TOCTOU) race condition in how the daemon handles files. This vulnerability allows an attacker with write access to a Rsync module path to manipulate file writes. By replacing parent directory components with symbolic links, an attacker can redirect file writes to locations outside of the intended directories. The vulnerability is triggered when the chroot setting is false. This can lead to arbitrary file creation or overwriting, and potentially escalate privileges if the Rsync daemon runs with elevated permissions. This vulnerability was published in May 2026 and is identified as CVE-2026-29518.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains write access to a Rsync module path, either through compromised credentials or misconfiguration.</li>
<li>Attacker identifies a target file or location outside of the intended module path.</li>
<li>Attacker crafts a malicious directory structure within the Rsync module path, replacing parent directories with symbolic links pointing to attacker-controlled locations.</li>
<li>Attacker initiates a file transfer operation using Rsync, targeting a file within the crafted malicious directory structure.</li>
<li>Rsync daemon performs initial checks on the directory structure.</li>
<li>Between the check and the actual file write, the attacker modifies the symbolic links to redirect the write operation to the target file or location outside of the Rsync module path.</li>
<li>Rsync daemon writes the file to the attacker-specified location, bypassing intended access controls.</li>
<li>If the attacker overwrites sensitive system files, this can lead to privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to create or overwrite arbitrary files on the system, potentially leading to privilege escalation if the Rsync daemon is running with elevated privileges. If the attacker overwrites critical system binaries or configuration files, they can gain complete control of the system. The impact is limited to systems where the chroot setting is false.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Rsync to version 3.4.3 or later to patch CVE-2026-29518.</li>
<li>Apply the &ldquo;Detect Rsync TOCTOU Attempt via Symlink Creation&rdquo; and &ldquo;Detect Rsync TOCTOU Attempt via File Modification&rdquo; Sigma rules to identify potential exploitation attempts.</li>
<li>Ensure the chroot setting is enabled in Rsync configurations to mitigate the vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>toctou</category><category>rsync</category></item><item><title>Rsync Integer Overflow Vulnerability Leading to Information Disclosure (CVE-2026-43618)</title><link>https://feed.craftedsignal.io/briefs/2026-05-rsync-integer-overflow/</link><pubDate>Wed, 20 May 2026 02:18:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-rsync-integer-overflow/</guid><description>Rsync versions 3.4.2 and prior contain an integer overflow vulnerability (CVE-2026-43618) in the compressed-token decoder, allowing a malicious sender to trigger out-of-bounds memory access on the receiver and disclose sensitive process memory.</description><content:encoded><![CDATA[<p>Rsync, a widely used utility for synchronizing files between computer systems, is susceptible to an integer overflow vulnerability (CVE-2026-43618) within its compressed-token decoder. Specifically, versions 3.4.2 and earlier fail to adequately validate a 32-bit signed counter, leading to an overflow condition. A malicious rsync sender can exploit this flaw by crafting a specially designed data stream that triggers the overflow during decompression on the receiving end. This overflow can cause the receiver process to read data outside of the intended buffer boundaries. Successful exploitation results in the disclosure of sensitive process memory contents.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious data stream designed to exploit the integer overflow in the rsync compressed-token decoder.</li>
<li>The attacker initiates an rsync session with a vulnerable rsync server (version 3.4.2 or prior).</li>
<li>During data transfer, the malicious data stream is sent to the rsync server.</li>
<li>The rsync server attempts to decompress the data stream using the vulnerable compressed-token decoder.</li>
<li>The 32-bit signed counter overflows due to the crafted data stream.</li>
<li>The overflow causes the rsync server process to read data from memory locations outside the intended buffer.</li>
<li>Sensitive information, such as environment variables, passwords, heap data, stack data, and library memory pointers, are exposed.</li>
<li>The attacker gains access to the disclosed memory contents, potentially facilitating further exploitation and bypassing ASLR.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-43618 leads to information disclosure on the affected system. An attacker can potentially access sensitive data residing in the rsync process memory, including environment variables, passwords, and memory addresses. This leaked information can be leveraged to bypass ASLR, escalate privileges, and perform lateral movement within the network. The vulnerability poses a significant risk to the confidentiality and integrity of the affected systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade rsync to a version higher than 3.4.2 to patch CVE-2026-43618.</li>
<li>Deploy the Sigma rule <code>Detect Rsync CVE-2026-43618 Integer Overflow Attempt</code> to detect potential exploitation attempts by monitoring process command-line arguments.</li>
<li>Review systems running vulnerable rsync versions for suspicious network connections and memory access patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>integer overflow</category><category>information disclosure</category><category>rsync</category></item></channel></rss>