CVE-2025-67901: CWE-1284 Improper Validation of Specified Quantity in Input in kristapsdz openrsync
openrsync through 0.5.0, as used in OpenBSD through 7.8 and on other platforms, allows a client to cause a server SIGSEGV by specifying a length of zero for block data, because the relationship between p->rem and p->len is not checked.
AI Analysis
Technical Summary
CVE-2025-67901 is a vulnerability classified under CWE-1284 (Improper Validation of Specified Quantity in Input) affecting openrsync versions through 0.5.0. openrsync is a lightweight rsync implementation used notably in OpenBSD up to version 7.8 and other platforms. The vulnerability stems from the server’s failure to properly validate the relationship between two internal variables, p->rem and p->len, which represent the remaining data and the length of a data block respectively. Specifically, a client can specify a block data length of zero, which the server does not correctly check, leading to a segmentation fault (SIGSEGV) and crashing the server process. This results in a denial of service (DoS) condition, impacting the availability of the service. The vulnerability requires network access to the openrsync server and low privileges, with no user interaction needed. The attack complexity is high due to the need to craft specific input triggering the flaw. There is no impact on confidentiality or integrity, as the vulnerability does not allow data disclosure or modification. No patches are currently linked, and no known exploits have been reported in the wild as of publication. The CVSS v3.1 base score is 5.3, reflecting a medium severity due to the DoS impact and exploitation conditions.
Potential Impact
For European organizations, the primary impact of CVE-2025-67901 is a denial of service on servers running openrsync, particularly those on OpenBSD 7.8 or earlier and other affected platforms. This could disrupt backup and synchronization operations critical to business continuity, especially in sectors relying on openrsync for data transfer and system maintenance. While the vulnerability does not compromise data confidentiality or integrity, the availability impact could lead to operational downtime, delayed data replication, and potential cascading effects on dependent systems. Organizations in finance, healthcare, government, and critical infrastructure sectors that utilize openrsync for secure file synchronization may face increased risk. The lack of known exploits reduces immediate threat levels, but the presence of a publicly disclosed vulnerability necessitates proactive mitigation to prevent potential future exploitation. Additionally, the high attack complexity somewhat limits widespread exploitation but does not eliminate risk from skilled attackers.
Mitigation Recommendations
1. Monitor official repositories and vendor communications for patches addressing CVE-2025-67901 and apply them promptly once available. 2. Restrict network access to openrsync servers by implementing firewall rules or network segmentation to limit connections to trusted clients only. 3. Employ intrusion detection/prevention systems (IDS/IPS) to detect anomalous or malformed openrsync traffic that could indicate exploitation attempts. 4. Consider temporarily disabling openrsync services on non-critical systems until patches are applied. 5. Review and harden configuration settings of openrsync to minimize exposure, including limiting allowed commands and enforcing strict authentication where possible. 6. Conduct regular backups and ensure recovery procedures are tested to mitigate potential downtime from DoS conditions. 7. Educate system administrators about the vulnerability and signs of exploitation to improve incident response readiness.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Norway, Denmark
CVE-2025-67901: CWE-1284 Improper Validation of Specified Quantity in Input in kristapsdz openrsync
Description
openrsync through 0.5.0, as used in OpenBSD through 7.8 and on other platforms, allows a client to cause a server SIGSEGV by specifying a length of zero for block data, because the relationship between p->rem and p->len is not checked.
AI-Powered Analysis
Technical Analysis
CVE-2025-67901 is a vulnerability classified under CWE-1284 (Improper Validation of Specified Quantity in Input) affecting openrsync versions through 0.5.0. openrsync is a lightweight rsync implementation used notably in OpenBSD up to version 7.8 and other platforms. The vulnerability stems from the server’s failure to properly validate the relationship between two internal variables, p->rem and p->len, which represent the remaining data and the length of a data block respectively. Specifically, a client can specify a block data length of zero, which the server does not correctly check, leading to a segmentation fault (SIGSEGV) and crashing the server process. This results in a denial of service (DoS) condition, impacting the availability of the service. The vulnerability requires network access to the openrsync server and low privileges, with no user interaction needed. The attack complexity is high due to the need to craft specific input triggering the flaw. There is no impact on confidentiality or integrity, as the vulnerability does not allow data disclosure or modification. No patches are currently linked, and no known exploits have been reported in the wild as of publication. The CVSS v3.1 base score is 5.3, reflecting a medium severity due to the DoS impact and exploitation conditions.
Potential Impact
For European organizations, the primary impact of CVE-2025-67901 is a denial of service on servers running openrsync, particularly those on OpenBSD 7.8 or earlier and other affected platforms. This could disrupt backup and synchronization operations critical to business continuity, especially in sectors relying on openrsync for data transfer and system maintenance. While the vulnerability does not compromise data confidentiality or integrity, the availability impact could lead to operational downtime, delayed data replication, and potential cascading effects on dependent systems. Organizations in finance, healthcare, government, and critical infrastructure sectors that utilize openrsync for secure file synchronization may face increased risk. The lack of known exploits reduces immediate threat levels, but the presence of a publicly disclosed vulnerability necessitates proactive mitigation to prevent potential future exploitation. Additionally, the high attack complexity somewhat limits widespread exploitation but does not eliminate risk from skilled attackers.
Mitigation Recommendations
1. Monitor official repositories and vendor communications for patches addressing CVE-2025-67901 and apply them promptly once available. 2. Restrict network access to openrsync servers by implementing firewall rules or network segmentation to limit connections to trusted clients only. 3. Employ intrusion detection/prevention systems (IDS/IPS) to detect anomalous or malformed openrsync traffic that could indicate exploitation attempts. 4. Consider temporarily disabling openrsync services on non-critical systems until patches are applied. 5. Review and harden configuration settings of openrsync to minimize exposure, including limiting allowed commands and enforcing strict authentication where possible. 6. Conduct regular backups and ensure recovery procedures are tested to mitigate potential downtime from DoS conditions. 7. Educate system administrators about the vulnerability and signs of exploitation to improve incident response readiness.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-14T23:50:38.613Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693f50a7b0f1e1d5302d6805
Added to database: 12/15/2025, 12:04:55 AM
Last enriched: 12/22/2025, 12:50:15 AM
Last updated: 2/6/2026, 5:56:27 AM
Views: 128
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1991: NULL Pointer Dereference in libuvc
MediumCVE-2026-1990: NULL Pointer Dereference in oatpp
MediumCVE-2026-1979: Use After Free in mruby
MediumCVE-2026-1978: Direct Request in kalyan02 NanoCMS
MediumCVE-2026-25698
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.