Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67901: CWE-1284 Improper Validation of Specified Quantity in Input in kristapsdz openrsync

0
Medium
VulnerabilityCVE-2025-67901cvecve-2025-67901cwe-1284
Published: Sun Dec 14 2025 (12/14/2025, 23:50:38 UTC)
Source: CVE Database V5
Vendor/Project: kristapsdz
Product: openrsync

Description

openrsync through 0.5.0, as used in OpenBSD through 7.8 and on other platforms, allows a client to cause a server SIGSEGV by specifying a length of zero for block data, because the relationship between p->rem and p->len is not checked.

AI-Powered Analysis

AILast updated: 12/15/2025, 00:19:58 UTC

Technical Analysis

CVE-2025-67901 is a vulnerability classified under CWE-1284 (Improper Validation of Specified Quantity in Input) affecting openrsync versions through 0.5.0. Openrsync is a lightweight rsync implementation by kristapsdz, used notably in OpenBSD up to version 7.8 and other platforms. The vulnerability occurs because the server does not properly validate the relationship between the remaining data length (p->rem) and the specified block length (p->len) when processing client input. Specifically, a client can specify a block data length of zero, which the server fails to handle correctly, resulting in a segmentation fault (SIGSEGV) and crashing the server process. This leads to a denial-of-service (DoS) condition, impacting the availability of the service. The CVSS v3.1 score is 5.3 (medium), reflecting that the attack vector is network-based (AV:N), requires low privileges (PR:L), no user interaction (UI:N), and has a high attack complexity (AC:H). The vulnerability does not affect confidentiality or integrity, only availability. No patches or fixes have been published at the time of disclosure, and no known exploits are reported in the wild. The vulnerability is significant for environments relying on openrsync for file synchronization, especially in OpenBSD deployments, where service disruption could impact operational continuity.

Potential Impact

The primary impact of CVE-2025-67901 is denial of service, as an attacker can remotely crash the openrsync server by sending malformed input specifying zero-length data blocks. For European organizations, this could disrupt automated file synchronization processes, potentially affecting backup operations, data replication, or deployment workflows that rely on openrsync. While no direct data breach or integrity compromise is indicated, service unavailability can lead to operational delays and increased recovery costs. Critical infrastructure or sectors with stringent uptime requirements, such as finance, telecommunications, and government services, may experience significant disruption. Since exploitation requires network access but only low privileges, internal threat actors or compromised hosts could trigger the vulnerability. The lack of patches increases exposure duration. Organizations using OpenBSD 7.8 or earlier and openrsync in production environments are particularly at risk. The medium severity rating suggests moderate urgency in remediation to prevent potential service outages.

Mitigation Recommendations

1. Restrict network access to openrsync servers by implementing firewall rules that limit connections to trusted IP addresses or VPNs, reducing exposure to untrusted clients. 2. Monitor openrsync server logs and system logs for unexpected crashes or SIGSEGV events to detect potential exploitation attempts early. 3. Temporarily disable openrsync services if they are not critical or replace them with alternative, patched synchronization tools until a vendor patch is available. 4. For organizations running OpenBSD 7.8 or earlier, consider upgrading to newer versions if they include updated openrsync or alternative secure file synchronization tools. 5. Implement network segmentation to isolate openrsync servers from general user networks to limit attack surface. 6. Engage with the openrsync project or vendor for updates and patches, and apply them promptly once available. 7. Conduct internal audits to identify all systems running openrsync and assess their exposure to this vulnerability. 8. Use intrusion detection/prevention systems (IDS/IPS) to detect anomalous traffic patterns targeting openrsync services.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-14T23:50:38.613Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693f50a7b0f1e1d5302d6805

Added to database: 12/15/2025, 12:04:55 AM

Last enriched: 12/15/2025, 12:19:58 AM

Last updated: 12/15/2025, 5:49:54 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats