CVE-2025-67901: CWE-1284 Improper Validation of Specified Quantity in Input in kristapsdz openrsync
openrsync through 0.5.0, as used in OpenBSD through 7.8 and on other platforms, allows a client to cause a server SIGSEGV by specifying a length of zero for block data, because the relationship between p->rem and p->len is not checked.
AI Analysis
Technical Summary
CVE-2025-67901 is a vulnerability classified under CWE-1284 (Improper Validation of Specified Quantity in Input) affecting openrsync versions through 0.5.0. Openrsync is a lightweight rsync implementation by kristapsdz, used notably in OpenBSD up to version 7.8 and other platforms. The vulnerability occurs because the server does not properly validate the relationship between the remaining data length (p->rem) and the specified block length (p->len) when processing client input. Specifically, a client can specify a block data length of zero, which the server fails to handle correctly, resulting in a segmentation fault (SIGSEGV) and crashing the server process. This leads to a denial-of-service (DoS) condition, impacting the availability of the service. The CVSS v3.1 score is 5.3 (medium), reflecting that the attack vector is network-based (AV:N), requires low privileges (PR:L), no user interaction (UI:N), and has a high attack complexity (AC:H). The vulnerability does not affect confidentiality or integrity, only availability. No patches or fixes have been published at the time of disclosure, and no known exploits are reported in the wild. The vulnerability is significant for environments relying on openrsync for file synchronization, especially in OpenBSD deployments, where service disruption could impact operational continuity.
Potential Impact
The primary impact of CVE-2025-67901 is denial of service, as an attacker can remotely crash the openrsync server by sending malformed input specifying zero-length data blocks. For European organizations, this could disrupt automated file synchronization processes, potentially affecting backup operations, data replication, or deployment workflows that rely on openrsync. While no direct data breach or integrity compromise is indicated, service unavailability can lead to operational delays and increased recovery costs. Critical infrastructure or sectors with stringent uptime requirements, such as finance, telecommunications, and government services, may experience significant disruption. Since exploitation requires network access but only low privileges, internal threat actors or compromised hosts could trigger the vulnerability. The lack of patches increases exposure duration. Organizations using OpenBSD 7.8 or earlier and openrsync in production environments are particularly at risk. The medium severity rating suggests moderate urgency in remediation to prevent potential service outages.
Mitigation Recommendations
1. Restrict network access to openrsync servers by implementing firewall rules that limit connections to trusted IP addresses or VPNs, reducing exposure to untrusted clients. 2. Monitor openrsync server logs and system logs for unexpected crashes or SIGSEGV events to detect potential exploitation attempts early. 3. Temporarily disable openrsync services if they are not critical or replace them with alternative, patched synchronization tools until a vendor patch is available. 4. For organizations running OpenBSD 7.8 or earlier, consider upgrading to newer versions if they include updated openrsync or alternative secure file synchronization tools. 5. Implement network segmentation to isolate openrsync servers from general user networks to limit attack surface. 6. Engage with the openrsync project or vendor for updates and patches, and apply them promptly once available. 7. Conduct internal audits to identify all systems running openrsync and assess their exposure to this vulnerability. 8. Use intrusion detection/prevention systems (IDS/IPS) to detect anomalous traffic patterns targeting openrsync services.
Affected Countries
Germany, Netherlands, United Kingdom, France, Sweden
CVE-2025-67901: CWE-1284 Improper Validation of Specified Quantity in Input in kristapsdz openrsync
Description
openrsync through 0.5.0, as used in OpenBSD through 7.8 and on other platforms, allows a client to cause a server SIGSEGV by specifying a length of zero for block data, because the relationship between p->rem and p->len is not checked.
AI-Powered Analysis
Technical Analysis
CVE-2025-67901 is a vulnerability classified under CWE-1284 (Improper Validation of Specified Quantity in Input) affecting openrsync versions through 0.5.0. Openrsync is a lightweight rsync implementation by kristapsdz, used notably in OpenBSD up to version 7.8 and other platforms. The vulnerability occurs because the server does not properly validate the relationship between the remaining data length (p->rem) and the specified block length (p->len) when processing client input. Specifically, a client can specify a block data length of zero, which the server fails to handle correctly, resulting in a segmentation fault (SIGSEGV) and crashing the server process. This leads to a denial-of-service (DoS) condition, impacting the availability of the service. The CVSS v3.1 score is 5.3 (medium), reflecting that the attack vector is network-based (AV:N), requires low privileges (PR:L), no user interaction (UI:N), and has a high attack complexity (AC:H). The vulnerability does not affect confidentiality or integrity, only availability. No patches or fixes have been published at the time of disclosure, and no known exploits are reported in the wild. The vulnerability is significant for environments relying on openrsync for file synchronization, especially in OpenBSD deployments, where service disruption could impact operational continuity.
Potential Impact
The primary impact of CVE-2025-67901 is denial of service, as an attacker can remotely crash the openrsync server by sending malformed input specifying zero-length data blocks. For European organizations, this could disrupt automated file synchronization processes, potentially affecting backup operations, data replication, or deployment workflows that rely on openrsync. While no direct data breach or integrity compromise is indicated, service unavailability can lead to operational delays and increased recovery costs. Critical infrastructure or sectors with stringent uptime requirements, such as finance, telecommunications, and government services, may experience significant disruption. Since exploitation requires network access but only low privileges, internal threat actors or compromised hosts could trigger the vulnerability. The lack of patches increases exposure duration. Organizations using OpenBSD 7.8 or earlier and openrsync in production environments are particularly at risk. The medium severity rating suggests moderate urgency in remediation to prevent potential service outages.
Mitigation Recommendations
1. Restrict network access to openrsync servers by implementing firewall rules that limit connections to trusted IP addresses or VPNs, reducing exposure to untrusted clients. 2. Monitor openrsync server logs and system logs for unexpected crashes or SIGSEGV events to detect potential exploitation attempts early. 3. Temporarily disable openrsync services if they are not critical or replace them with alternative, patched synchronization tools until a vendor patch is available. 4. For organizations running OpenBSD 7.8 or earlier, consider upgrading to newer versions if they include updated openrsync or alternative secure file synchronization tools. 5. Implement network segmentation to isolate openrsync servers from general user networks to limit attack surface. 6. Engage with the openrsync project or vendor for updates and patches, and apply them promptly once available. 7. Conduct internal audits to identify all systems running openrsync and assess their exposure to this vulnerability. 8. Use intrusion detection/prevention systems (IDS/IPS) to detect anomalous traffic patterns targeting openrsync services.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-14T23:50:38.613Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693f50a7b0f1e1d5302d6805
Added to database: 12/15/2025, 12:04:55 AM
Last enriched: 12/15/2025, 12:19:58 AM
Last updated: 12/15/2025, 5:49:54 AM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14712: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in JHENG GAO Student Learning Assessment and Support System
HighCVE-2025-14706: Command Injection in Shiguangwu sgwbox N3
CriticalCVE-2025-14705: Command Injection in Shiguangwu sgwbox N3
CriticalCVE-2025-14704: Path Traversal in Shiguangwu sgwbox N3
MediumCVE-2025-14703: Improper Authentication in Shiguangwu sgwbox N3
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.