Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67901: CWE-1284 Improper Validation of Specified Quantity in Input in kristapsdz openrsync

0
Medium
VulnerabilityCVE-2025-67901cvecve-2025-67901cwe-1284
Published: Sun Dec 14 2025 (12/14/2025, 23:50:38 UTC)
Source: CVE Database V5
Vendor/Project: kristapsdz
Product: openrsync

Description

openrsync through 0.5.0, as used in OpenBSD through 7.8 and on other platforms, allows a client to cause a server SIGSEGV by specifying a length of zero for block data, because the relationship between p->rem and p->len is not checked.

AI-Powered Analysis

AILast updated: 12/22/2025, 00:50:15 UTC

Technical Analysis

CVE-2025-67901 is a vulnerability classified under CWE-1284 (Improper Validation of Specified Quantity in Input) affecting openrsync versions through 0.5.0. openrsync is a lightweight rsync implementation used notably in OpenBSD up to version 7.8 and other platforms. The vulnerability stems from the server’s failure to properly validate the relationship between two internal variables, p->rem and p->len, which represent the remaining data and the length of a data block respectively. Specifically, a client can specify a block data length of zero, which the server does not correctly check, leading to a segmentation fault (SIGSEGV) and crashing the server process. This results in a denial of service (DoS) condition, impacting the availability of the service. The vulnerability requires network access to the openrsync server and low privileges, with no user interaction needed. The attack complexity is high due to the need to craft specific input triggering the flaw. There is no impact on confidentiality or integrity, as the vulnerability does not allow data disclosure or modification. No patches are currently linked, and no known exploits have been reported in the wild as of publication. The CVSS v3.1 base score is 5.3, reflecting a medium severity due to the DoS impact and exploitation conditions.

Potential Impact

For European organizations, the primary impact of CVE-2025-67901 is a denial of service on servers running openrsync, particularly those on OpenBSD 7.8 or earlier and other affected platforms. This could disrupt backup and synchronization operations critical to business continuity, especially in sectors relying on openrsync for data transfer and system maintenance. While the vulnerability does not compromise data confidentiality or integrity, the availability impact could lead to operational downtime, delayed data replication, and potential cascading effects on dependent systems. Organizations in finance, healthcare, government, and critical infrastructure sectors that utilize openrsync for secure file synchronization may face increased risk. The lack of known exploits reduces immediate threat levels, but the presence of a publicly disclosed vulnerability necessitates proactive mitigation to prevent potential future exploitation. Additionally, the high attack complexity somewhat limits widespread exploitation but does not eliminate risk from skilled attackers.

Mitigation Recommendations

1. Monitor official repositories and vendor communications for patches addressing CVE-2025-67901 and apply them promptly once available. 2. Restrict network access to openrsync servers by implementing firewall rules or network segmentation to limit connections to trusted clients only. 3. Employ intrusion detection/prevention systems (IDS/IPS) to detect anomalous or malformed openrsync traffic that could indicate exploitation attempts. 4. Consider temporarily disabling openrsync services on non-critical systems until patches are applied. 5. Review and harden configuration settings of openrsync to minimize exposure, including limiting allowed commands and enforcing strict authentication where possible. 6. Conduct regular backups and ensure recovery procedures are tested to mitigate potential downtime from DoS conditions. 7. Educate system administrators about the vulnerability and signs of exploitation to improve incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-14T23:50:38.613Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693f50a7b0f1e1d5302d6805

Added to database: 12/15/2025, 12:04:55 AM

Last enriched: 12/22/2025, 12:50:15 AM

Last updated: 2/6/2026, 5:56:27 AM

Views: 128

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats