Vulnerabilites related to rsyslog - rsyslog
cve-2014-3634
Vulnerability from cvelistv5
Published
2014-11-02 00:00
Modified
2024-08-06 10:50
Severity ?
EPSS score ?
Summary
rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:50:18.205Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2014:1297", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html" }, { "name": "RHSA-2014:1671", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1671.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0411.html" }, { "name": "SUSE-SU-2014:1294", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html" }, { "name": "openSUSE-SU-2014:1298", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html" }, { "name": "RHSA-2014:1654", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1654.html" }, { "name": "61720", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61720" }, { "name": "MDVSA-2015:130", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:130" }, { "name": "[oss-security] 20140930 vulnerability in rsyslog", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/09/30/15" }, { "name": "61494", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61494" }, { "name": "RHSA-2014:1397", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1397.html" }, { "name": "[oss-security] 20141003 sysklogd vulnerability (CVE-2014-3634)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/10/03/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1654" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rsyslog.com/remote-syslog-pri-vulnerability/" }, { "name": "USN-2381-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2381-1" }, { "name": "DSA-3040", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3040" }, { "name": "61930", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61930" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-30T00:00:00", "descriptions": [ { "lang": "en", "value": "rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-14T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "openSUSE-SU-2014:1297", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html" }, { "name": "RHSA-2014:1671", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1671.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0411.html" }, { "name": "SUSE-SU-2014:1294", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html" }, { "name": "openSUSE-SU-2014:1298", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html" }, { "name": "RHSA-2014:1654", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1654.html" }, { "name": "61720", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61720" }, { "name": "MDVSA-2015:130", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:130" }, { "name": "[oss-security] 20140930 vulnerability in rsyslog", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/09/30/15" }, { "name": "61494", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61494" }, { "name": "RHSA-2014:1397", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1397.html" }, { "name": "[oss-security] 20141003 sysklogd vulnerability (CVE-2014-3634)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/10/03/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1654" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rsyslog.com/remote-syslog-pri-vulnerability/" }, { "name": "USN-2381-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2381-1" }, { "name": "DSA-3040", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3040" }, { "name": "61930", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61930" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3634", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2014:1297", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html" }, { "name": "RHSA-2014:1671", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1671.html" }, { "name": "http://advisories.mageia.org/MGASA-2014-0411.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0411.html" }, { "name": "SUSE-SU-2014:1294", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html" }, { "name": "openSUSE-SU-2014:1298", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html" }, { "name": "RHSA-2014:1654", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1654.html" }, { "name": "61720", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61720" }, { "name": "MDVSA-2015:130", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:130" }, { "name": "[oss-security] 20140930 vulnerability in rsyslog", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/09/30/15" }, { "name": "61494", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61494" }, { "name": "RHSA-2014:1397", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1397.html" }, { "name": "[oss-security] 20141003 sysklogd vulnerability (CVE-2014-3634)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/10/03/1" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-1654", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-1654" }, { "name": "http://www.rsyslog.com/remote-syslog-pri-vulnerability/", "refsource": "CONFIRM", "url": "http://www.rsyslog.com/remote-syslog-pri-vulnerability/" }, { "name": "USN-2381-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2381-1" }, { "name": "DSA-3040", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3040" }, { "name": "61930", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61930" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3634", "datePublished": "2014-11-02T00:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:50:18.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-3200
Vulnerability from cvelistv5
Published
2011-09-06 16:00
Modified
2024-08-06 23:29
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:29:55.424Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46027", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46027" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727644" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rsyslog.com/potential-dos-with-malformed-tag/" }, { "name": "1026000", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1026000" }, { "name": "openSUSE-SU-2011:1020", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2011-09/msg00013.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=1ca6cc236d1dabf1633238b873fb1c057e52f95e" }, { "name": "RHSA-2011:1247", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1247.html" }, { "name": "MDVSA-2011:134", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:134" }, { "name": "FEDORA-2011-12282", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065941.html" }, { "name": "49413", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/49413" }, { "name": "FEDORA-2011-12250", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065837.html" }, { "name": "45922", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45922" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-09-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-09-23T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "46027", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46027" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727644" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rsyslog.com/potential-dos-with-malformed-tag/" }, { "name": "1026000", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1026000" }, { "name": "openSUSE-SU-2011:1020", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2011-09/msg00013.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=1ca6cc236d1dabf1633238b873fb1c057e52f95e" }, { "name": "RHSA-2011:1247", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1247.html" }, { "name": "MDVSA-2011:134", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:134" }, { "name": "FEDORA-2011-12282", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065941.html" }, { "name": "49413", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/49413" }, { "name": "FEDORA-2011-12250", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065837.html" }, { "name": "45922", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45922" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-3200", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46027", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/46027" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=727644", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727644" }, { "name": "http://www.rsyslog.com/potential-dos-with-malformed-tag/", "refsource": "CONFIRM", "url": "http://www.rsyslog.com/potential-dos-with-malformed-tag/" }, { "name": "1026000", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1026000" }, { "name": "openSUSE-SU-2011:1020", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2011-09/msg00013.html" }, { "name": "http://git.adiscon.com/?p=rsyslog.git;a=commit;h=1ca6cc236d1dabf1633238b873fb1c057e52f95e", "refsource": "CONFIRM", "url": "http://git.adiscon.com/?p=rsyslog.git;a=commit;h=1ca6cc236d1dabf1633238b873fb1c057e52f95e" }, { "name": "RHSA-2011:1247", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-1247.html" }, { "name": "MDVSA-2011:134", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:134" }, { "name": "FEDORA-2011-12282", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065941.html" }, { "name": "49413", "refsource": "BID", "url": "http://www.securityfocus.com/bid/49413" }, { "name": "FEDORA-2011-12250", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065837.html" }, { "name": "45922", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45922" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-3200", "datePublished": "2011-09-06T16:00:00", "dateReserved": "2011-08-19T00:00:00", "dateUpdated": "2024-08-06T23:29:55.424Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-1490
Vulnerability from cvelistv5
Published
2019-11-14 01:37
Modified
2024-08-06 22:28
Severity ?
EPSS score ?
Summary
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2011-1490 | x_refsource_MISC | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1490 | x_refsource_MISC | |
https://access.redhat.com/security/cve/cve-2011-1490 | x_refsource_MISC | |
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html | x_refsource_MISC | |
https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:28:41.394Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1490" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1490" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2011-1490" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "rsyslog", "vendor": "rsyslog", "versions": [ { "status": "affected", "version": "before 5.7.6" } ] } ], "descriptions": [ { "lang": "en", "value": "A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset" } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Leak", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-19T19:04:26", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1490" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1490" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2011-1490" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1490", "datePublished": "2019-11-14T01:37:43", "dateReserved": "2011-03-21T00:00:00", "dateUpdated": "2024-08-06T22:28:41.394Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-1489
Vulnerability from cvelistv5
Published
2019-11-14 01:25
Modified
2024-08-06 22:28
Severity ?
EPSS score ?
Summary
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages were logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset.
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2011-1489 | x_refsource_MISC | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1489 | x_refsource_MISC | |
https://access.redhat.com/security/cve/cve-2011-1489 | x_refsource_MISC | |
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html | x_refsource_MISC | |
https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:28:41.423Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1489" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1489" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2011-1489" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "rsyslog", "vendor": "rsyslog", "versions": [ { "status": "affected", "version": "before 5.7.6" } ] } ], "descriptions": [ { "lang": "en", "value": "A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages were logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Leak", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-19T19:01:08", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1489" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1489" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2011-1489" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1489", "datePublished": "2019-11-14T01:25:49", "dateReserved": "2011-03-21T00:00:00", "dateUpdated": "2024-08-06T22:28:41.423Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-17041
Vulnerability from cvelistv5
Published
2019-10-07 15:31
Modified
2024-08-05 01:24
Severity ?
EPSS score ?
Summary
An issue was discovered in Rsyslog v8.1908.0. contrib/pmaixforwardedfrom/pmaixforwardedfrom.c has a heap overflow in the parser for AIX log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon) but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow.
References
▼ | URL | Tags |
---|---|---|
https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog | x_refsource_CONFIRM | |
https://github.com/rsyslog/rsyslog/pull/3884 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html | vendor-advisory, x_refsource_SUSE | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.725Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rsyslog/rsyslog/pull/3884" }, { "name": "openSUSE-SU-2019:2500", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html" }, { "name": "openSUSE-SU-2019:2501", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html" }, { "name": "FEDORA-2019-ea7d5876a4", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/" }, { "name": "FEDORA-2019-1fb95ae48d", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/" }, { "name": "[debian-lts-announce] 20211130 [SECURITY] [DLA 2835-1] rsyslog security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Rsyslog v8.1908.0. contrib/pmaixforwardedfrom/pmaixforwardedfrom.c has a heap overflow in the parser for AIX log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon) but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-01T01:06:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rsyslog/rsyslog/pull/3884" }, { "name": "openSUSE-SU-2019:2500", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html" }, { "name": "openSUSE-SU-2019:2501", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html" }, { "name": "FEDORA-2019-ea7d5876a4", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/" }, { "name": "FEDORA-2019-1fb95ae48d", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/" }, { "name": "[debian-lts-announce] 20211130 [SECURITY] [DLA 2835-1] rsyslog security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-17041", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Rsyslog v8.1908.0. contrib/pmaixforwardedfrom/pmaixforwardedfrom.c has a heap overflow in the parser for AIX log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon) but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog", "refsource": "CONFIRM", "url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog" }, { "name": "https://github.com/rsyslog/rsyslog/pull/3884", "refsource": "CONFIRM", "url": "https://github.com/rsyslog/rsyslog/pull/3884" }, { "name": "openSUSE-SU-2019:2500", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html" }, { "name": "openSUSE-SU-2019:2501", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html" }, { "name": "FEDORA-2019-ea7d5876a4", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/" }, { "name": "FEDORA-2019-1fb95ae48d", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/" }, { "name": "[debian-lts-announce] 20211130 [SECURITY] [DLA 2835-1] rsyslog security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-17041", "datePublished": "2019-10-07T15:31:17", "dateReserved": "2019-09-30T00:00:00", "dateUpdated": "2024-08-05T01:24:48.725Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-1488
Vulnerability from cvelistv5
Published
2019-11-14 01:15
Modified
2024-08-06 22:28
Severity ?
EPSS score ?
Summary
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent within short periods of time.
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2011-1488 | x_refsource_MISC | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1488 | x_refsource_MISC | |
https://access.redhat.com/security/cve/cve-2011-1488 | x_refsource_MISC | |
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html | x_refsource_MISC | |
https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:28:41.761Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1488" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1488" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2011-1488" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "rsyslog", "vendor": "rsyslog", "versions": [ { "status": "affected", "version": "before 5.7.6" } ] } ], "descriptions": [ { "lang": "en", "value": "A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent within short periods of time." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Leak", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-19T18:56:44", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1488" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1488" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2011-1488" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1488", "datePublished": "2019-11-14T01:15:49", "dateReserved": "2011-03-21T00:00:00", "dateUpdated": "2024-08-06T22:28:41.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4623
Vulnerability from cvelistv5
Published
2012-09-25 23:00
Modified
2024-08-07 00:09
Severity ?
EPSS score ?
Summary
Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.
References
▼ | URL | Tags |
---|---|---|
http://bugzilla.adiscon.com/show_bug.cgi?id=221 | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-1338-1 | vendor-advisory, x_refsource_UBUNTU | |
http://rsyslog.com/changelog-for-6-1-4-devel/ | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=769822 | x_refsource_MISC | |
http://git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=6bad782f154b7f838c7371bf99c13f6dc4ec4101 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1026556 | vdb-entry, x_refsource_SECTRACK | |
http://rsyslog.com/changelog-for-5-7-4-v5-beta/ | x_refsource_CONFIRM | |
http://secunia.com/advisories/45848 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/51171 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/47698 | third-party-advisory, x_refsource_SECUNIA | |
http://rsyslog.com/changelog-for-4-6-6-v4-stable/ | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2011/12/22/2 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:09:19.333Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugzilla.adiscon.com/show_bug.cgi?id=221" }, { "name": "USN-1338-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1338-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://rsyslog.com/changelog-for-6-1-4-devel/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769822" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=6bad782f154b7f838c7371bf99c13f6dc4ec4101" }, { "name": "1026556", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026556" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://rsyslog.com/changelog-for-5-7-4-v5-beta/" }, { "name": "45848", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45848" }, { "name": "51171", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51171" }, { "name": "47698", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47698" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://rsyslog.com/changelog-for-4-6-6-v4-stable/" }, { "name": "[oss-security] 20111222 Re: CVE Request -- rsyslog -- DoS due integer signedness error while extending rsyslog counted string buffer", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/12/22/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-23T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugzilla.adiscon.com/show_bug.cgi?id=221" }, { "name": "USN-1338-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1338-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://rsyslog.com/changelog-for-6-1-4-devel/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769822" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=6bad782f154b7f838c7371bf99c13f6dc4ec4101" }, { "name": "1026556", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026556" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://rsyslog.com/changelog-for-5-7-4-v5-beta/" }, { "name": "45848", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45848" }, { "name": "51171", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51171" }, { "name": "47698", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47698" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://rsyslog.com/changelog-for-4-6-6-v4-stable/" }, { "name": "[oss-security] 20111222 Re: CVE Request -- rsyslog -- DoS due integer signedness error while extending rsyslog counted string buffer", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/12/22/2" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-4623", "datePublished": "2012-09-25T23:00:00", "dateReserved": "2011-11-29T00:00:00", "dateUpdated": "2024-08-07T00:09:19.333Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24903
Vulnerability from cvelistv5
Published
2022-05-05 00:00
Modified
2024-08-03 04:29
Severity ?
EPSS score ?
Summary
Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message reception. It is best practice not to directly expose them to the public. When this practice is followed, the risk is considerably lower. Module `imdiag` is a diagnostics module primarily intended for testbench runs. We do not expect it to be present on any production installation. Octet-counted framing is not very common. Usually, it needs to be specifically enabled at senders. If users do not need it, they can turn it off for the most important modules. This will mitigate the vulnerability.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:01.617Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8" }, { "tags": [ "x_transferred" ], "url": "https://github.com/rsyslog/rsyslog/commit/f211042ecbb472f9d8beb4678a65d272b6f07705" }, { "name": "FEDORA-2022-f796a28a7b", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMNNXLCU2UORRVSZO24HL4KMVPK5PHVW/" }, { "name": "[debian-lts-announce] 20220520 [SECURITY] [DLA 3016-1] rsyslog security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00028.html" }, { "name": "DSA-5150", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5150" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20221111-0002/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "rsyslog", "vendor": "rsyslog", "versions": [ { "status": "affected", "version": "\u003c 8.2204.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message reception. It is best practice not to directly expose them to the public. When this practice is followed, the risk is considerably lower. Module `imdiag` is a diagnostics module primarily intended for testbench runs. We do not expect it to be present on any production installation. Octet-counted framing is not very common. Usually, it needs to be specifically enabled at senders. If users do not need it, they can turn it off for the most important modules. This will mitigate the vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8" }, { "url": "https://github.com/rsyslog/rsyslog/commit/f211042ecbb472f9d8beb4678a65d272b6f07705" }, { "name": "FEDORA-2022-f796a28a7b", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMNNXLCU2UORRVSZO24HL4KMVPK5PHVW/" }, { "name": "[debian-lts-announce] 20220520 [SECURITY] [DLA 3016-1] rsyslog security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00028.html" }, { "name": "DSA-5150", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5150" }, { "url": "https://security.netapp.com/advisory/ntap-20221111-0002/" } ], "source": { "advisory": "GHSA-ggw7-xr6h-mmr8", "discovery": "UNKNOWN" }, "title": "Buffer overflow in TCP syslog server (receiver) components in rsyslog" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24903", "datePublished": "2022-05-05T00:00:00", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:29:01.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12588
Vulnerability from cvelistv5
Published
2017-08-06 14:00
Modified
2024-12-27 16:02
Severity ?
EPSS score ?
Summary
The zmq3 input and output modules in rsyslog before 8.28.0 interpreted description fields as format strings, possibly allowing a format string attack with unspecified impact.
References
▼ | URL | Tags |
---|---|---|
https://github.com/rsyslog/rsyslog/pull/1565 | x_refsource_CONFIRM | |
https://github.com/rsyslog/rsyslog/commit/062d0c671a29f7c6f7dff4a2f1f35df375bbb30b | x_refsource_CONFIRM | |
https://github.com/rsyslog/rsyslog/blob/master/ChangeLog | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-12-27T16:02:55.291Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rsyslog/rsyslog/pull/1565" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rsyslog/rsyslog/commit/062d0c671a29f7c6f7dff4a2f1f35df375bbb30b" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rsyslog/rsyslog/blob/master/ChangeLog" }, { "url": "https://security.netapp.com/advisory/ntap-20241227-0009/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-08-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The zmq3 input and output modules in rsyslog before 8.28.0 interpreted description fields as format strings, possibly allowing a format string attack with unspecified impact." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-06T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rsyslog/rsyslog/pull/1565" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rsyslog/rsyslog/commit/062d0c671a29f7c6f7dff4a2f1f35df375bbb30b" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rsyslog/rsyslog/blob/master/ChangeLog" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-12588", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The zmq3 input and output modules in rsyslog before 8.28.0 interpreted description fields as format strings, possibly allowing a format string attack with unspecified impact." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/rsyslog/rsyslog/pull/1565", "refsource": "CONFIRM", "url": "https://github.com/rsyslog/rsyslog/pull/1565" }, { "name": "https://github.com/rsyslog/rsyslog/commit/062d0c671a29f7c6f7dff4a2f1f35df375bbb30b", "refsource": "CONFIRM", "url": "https://github.com/rsyslog/rsyslog/commit/062d0c671a29f7c6f7dff4a2f1f35df375bbb30b" }, { "name": "https://github.com/rsyslog/rsyslog/blob/master/ChangeLog", "refsource": "CONFIRM", "url": "https://github.com/rsyslog/rsyslog/blob/master/ChangeLog" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-12588", "datePublished": "2017-08-06T14:00:00", "dateReserved": "2017-08-06T00:00:00", "dateUpdated": "2024-12-27T16:02:55.291Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-5618
Vulnerability from cvelistv5
Published
2008-12-17 02:00
Modified
2024-09-16 18:34
Severity ?
EPSS score ?
Summary
imudp in rsyslog 4.x before 4.1.2, 3.21 before 3.21.9 beta, and 3.20 before 3.20.2 generates a message even when it is sent by an unauthorized sender, which allows remote attackers to cause a denial of service (disk consumption) via a large number of spurious messages.
References
▼ | URL | Tags |
---|---|---|
http://www.rsyslog.com/Topic4.phtml | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:56:47.372Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rsyslog.com/Topic4.phtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "imudp in rsyslog 4.x before 4.1.2, 3.21 before 3.21.9 beta, and 3.20 before 3.20.2 generates a message even when it is sent by an unauthorized sender, which allows remote attackers to cause a denial of service (disk consumption) via a large number of spurious messages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-12-17T02:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rsyslog.com/Topic4.phtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5618", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "imudp in rsyslog 4.x before 4.1.2, 3.21 before 3.21.9 beta, and 3.20 before 3.20.2 generates a message even when it is sent by an unauthorized sender, which allows remote attackers to cause a denial of service (disk consumption) via a large number of spurious messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.rsyslog.com/Topic4.phtml", "refsource": "CONFIRM", "url": "http://www.rsyslog.com/Topic4.phtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5618", "datePublished": "2008-12-17T02:00:00Z", "dateReserved": "2008-12-16T00:00:00Z", "dateUpdated": "2024-09-16T18:34:14.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-17042
Vulnerability from cvelistv5
Published
2019-10-07 15:34
Modified
2024-08-05 01:24
Severity ?
EPSS score ?
Summary
An issue was discovered in Rsyslog v8.1908.0. contrib/pmcisconames/pmcisconames.c has a heap overflow in the parser for Cisco log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon), but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow.
References
▼ | URL | Tags |
---|---|---|
https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog | x_refsource_CONFIRM | |
https://github.com/rsyslog/rsyslog/pull/3883 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html | vendor-advisory, x_refsource_SUSE | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.684Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rsyslog/rsyslog/pull/3883" }, { "name": "openSUSE-SU-2019:2500", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html" }, { "name": "openSUSE-SU-2019:2501", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html" }, { "name": "FEDORA-2019-ea7d5876a4", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/" }, { "name": "FEDORA-2019-1fb95ae48d", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/" }, { "name": "[debian-lts-announce] 20211130 [SECURITY] [DLA 2835-1] rsyslog security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Rsyslog v8.1908.0. contrib/pmcisconames/pmcisconames.c has a heap overflow in the parser for Cisco log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon), but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-01T01:06:10", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rsyslog/rsyslog/pull/3883" }, { "name": "openSUSE-SU-2019:2500", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html" }, { "name": "openSUSE-SU-2019:2501", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html" }, { "name": "FEDORA-2019-ea7d5876a4", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/" }, { "name": "FEDORA-2019-1fb95ae48d", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/" }, { "name": "[debian-lts-announce] 20211130 [SECURITY] [DLA 2835-1] rsyslog security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-17042", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Rsyslog v8.1908.0. contrib/pmcisconames/pmcisconames.c has a heap overflow in the parser for Cisco log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon), but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog", "refsource": "CONFIRM", "url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog" }, { "name": "https://github.com/rsyslog/rsyslog/pull/3883", "refsource": "CONFIRM", "url": "https://github.com/rsyslog/rsyslog/pull/3883" }, { "name": "openSUSE-SU-2019:2500", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html" }, { "name": "openSUSE-SU-2019:2501", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html" }, { "name": "FEDORA-2019-ea7d5876a4", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/" }, { "name": "FEDORA-2019-1fb95ae48d", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/" }, { "name": "[debian-lts-announce] 20211130 [SECURITY] [DLA 2835-1] rsyslog security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-17042", "datePublished": "2019-10-07T15:34:04", "dateReserved": "2019-09-30T00:00:00", "dateUpdated": "2024-08-05T01:24:48.684Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-17040
Vulnerability from cvelistv5
Published
2019-09-30 13:06
Modified
2024-08-05 01:24
Severity ?
EPSS score ?
Summary
contrib/pmdb2diag/pmdb2diag.c in Rsyslog v8.1908.0 allows out-of-bounds access because the level length is mishandled.
References
▼ | URL | Tags |
---|---|---|
https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog | x_refsource_CONFIRM | |
https://github.com/rsyslog/rsyslog/pull/3875 | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.756Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rsyslog/rsyslog/pull/3875" }, { "name": "FEDORA-2019-ea7d5876a4", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/" }, { "name": "FEDORA-2019-1fb95ae48d", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "contrib/pmdb2diag/pmdb2diag.c in Rsyslog v8.1908.0 allows out-of-bounds access because the level length is mishandled." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-24T02:07:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rsyslog/rsyslog/pull/3875" }, { "name": "FEDORA-2019-ea7d5876a4", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/" }, { "name": "FEDORA-2019-1fb95ae48d", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-17040", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "contrib/pmdb2diag/pmdb2diag.c in Rsyslog v8.1908.0 allows out-of-bounds access because the level length is mishandled." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog", "refsource": "CONFIRM", "url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog" }, { "name": "https://github.com/rsyslog/rsyslog/pull/3875", "refsource": "CONFIRM", "url": "https://github.com/rsyslog/rsyslog/pull/3875" }, { "name": "FEDORA-2019-ea7d5876a4", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/" }, { "name": "FEDORA-2019-1fb95ae48d", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-17040", "datePublished": "2019-09-30T13:06:43", "dateReserved": "2019-09-30T00:00:00", "dateUpdated": "2024-08-05T01:24:48.756Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16881
Vulnerability from cvelistv5
Published
2019-01-25 18:00
Modified
2024-08-05 10:32
Severity ?
EPSS score ?
Summary
A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to crash. Versions before 8.27.0 are vulnerable.
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2019:2110 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2019:2439 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2019:2437 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHBA-2019:2501 | vendor-advisory, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16881 | x_refsource_CONFIRM | |
https://lists.debian.org/debian-lts-announce/2022/05/msg00028.html | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The rsyslog Project | rsyslog: |
Version: 8.27.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:32:54.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2019:2110", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2110" }, { "name": "RHSA-2019:2439", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2439" }, { "name": "RHSA-2019:2437", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2437" }, { "name": "RHBA-2019:2501", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHBA-2019:2501" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16881" }, { "name": "[debian-lts-announce] 20220520 [SECURITY] [DLA 3016-1] rsyslog security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00028.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "rsyslog:", "vendor": "The rsyslog Project", "versions": [ { "status": "affected", "version": "8.27.0" } ] } ], "datePublic": "2017-04-19T00:00:00", "descriptions": [ { "lang": "en", "value": "A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to crash. Versions before 8.27.0 are vulnerable." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-21T00:06:11", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2019:2110", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2110" }, { "name": "RHSA-2019:2439", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2439" }, { "name": "RHSA-2019:2437", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2437" }, { "name": "RHBA-2019:2501", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHBA-2019:2501" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16881" }, { "name": "[debian-lts-announce] 20220520 [SECURITY] [DLA 3016-1] rsyslog security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00028.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16881", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "rsyslog:", "version": { "version_data": [ { "version_value": "8.27.0" } ] } } ] }, "vendor_name": "The rsyslog Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to crash. Versions before 8.27.0 are vulnerable." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2019:2110", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2110" }, { "name": "RHSA-2019:2439", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2439" }, { "name": "RHSA-2019:2437", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2437" }, { "name": "RHBA-2019:2501", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHBA-2019:2501" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16881", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16881" }, { "name": "[debian-lts-announce] 20220520 [SECURITY] [DLA 3016-1] rsyslog security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00028.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-16881", "datePublished": "2019-01-25T18:00:00", "dateReserved": "2018-09-11T00:00:00", "dateUpdated": "2024-08-05T10:32:54.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4758
Vulnerability from cvelistv5
Published
2013-10-04 17:00
Modified
2024-09-16 18:34
Severity ?
EPSS score ?
Summary
Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2013/07/05/2 | mailing-list, x_refsource_MLIST | |
http://www.rsyslog.com/rsyslog-7-5-2-v7-devel-released/ | x_refsource_CONFIRM | |
http://www.rsyslog.com/rsyslog-7-4-2-v7-stable-released/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:52:27.073Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20130705 LSE Leading Security Experts GmbH - LSE-2013-07-03 - rsyslog ElasticSearch Plugin", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/07/05/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rsyslog.com/rsyslog-7-5-2-v7-devel-released/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rsyslog.com/rsyslog-7-4-2-v7-stable-released/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-10-04T17:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20130705 LSE Leading Security Experts GmbH - LSE-2013-07-03 - rsyslog ElasticSearch Plugin", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2013/07/05/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rsyslog.com/rsyslog-7-5-2-v7-devel-released/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rsyslog.com/rsyslog-7-4-2-v7-stable-released/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4758", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20130705 LSE Leading Security Experts GmbH - LSE-2013-07-03 - rsyslog ElasticSearch Plugin", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2013/07/05/2" }, { "name": "http://www.rsyslog.com/rsyslog-7-5-2-v7-devel-released/", "refsource": "CONFIRM", "url": "http://www.rsyslog.com/rsyslog-7-5-2-v7-devel-released/" }, { "name": "http://www.rsyslog.com/rsyslog-7-4-2-v7-stable-released/", "refsource": "CONFIRM", "url": "http://www.rsyslog.com/rsyslog-7-4-2-v7-stable-released/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4758", "datePublished": "2013-10-04T17:00:00Z", "dateReserved": "2013-07-04T00:00:00Z", "dateUpdated": "2024-09-16T18:34:27.910Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3683
Vulnerability from cvelistv5
Published
2014-11-02 00:00
Modified
2024-08-06 10:50
Severity ?
EPSS score ?
Summary
Integer overflow in rsyslog before 7.6.7 and 8.x before 8.4.2 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash) via a large priority (PRI) value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3634.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html | vendor-advisory, x_refsource_SUSE | |
http://www.openwall.com/lists/oss-security/2014/09/30/15 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/61494 | third-party-advisory, x_refsource_SECUNIA | |
http://www.openwall.com/lists/oss-security/2014/10/03/1 | mailing-list, x_refsource_MLIST | |
http://www.rsyslog.com/remote-syslog-pri-vulnerability-cve-2014-3683/ | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-2381-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.debian.org/security/2014/dsa-3047 | vendor-advisory, x_refsource_DEBIAN | |
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:50:18.315Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2014:1297", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html" }, { "name": "SUSE-SU-2014:1294", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html" }, { "name": "openSUSE-SU-2014:1298", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html" }, { "name": "[oss-security] 20140930 vulnerability in rsyslog", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/09/30/15" }, { "name": "61494", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61494" }, { "name": "[oss-security] 20141003 sysklogd vulnerability (CVE-2014-3634)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/10/03/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rsyslog.com/remote-syslog-pri-vulnerability-cve-2014-3683/" }, { "name": "USN-2381-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2381-1" }, { "name": "DSA-3047", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3047" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-10-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in rsyslog before 7.6.7 and 8.x before 8.4.2 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash) via a large priority (PRI) value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3634." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-14T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "openSUSE-SU-2014:1297", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html" }, { "name": "SUSE-SU-2014:1294", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html" }, { "name": "openSUSE-SU-2014:1298", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html" }, { "name": "[oss-security] 20140930 vulnerability in rsyslog", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/09/30/15" }, { "name": "61494", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61494" }, { "name": "[oss-security] 20141003 sysklogd vulnerability (CVE-2014-3634)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/10/03/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rsyslog.com/remote-syslog-pri-vulnerability-cve-2014-3683/" }, { "name": "USN-2381-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2381-1" }, { "name": "DSA-3047", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3047" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3683", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in rsyslog before 7.6.7 and 8.x before 8.4.2 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash) via a large priority (PRI) value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3634." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2014:1297", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html" }, { "name": "SUSE-SU-2014:1294", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html" }, { "name": "openSUSE-SU-2014:1298", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html" }, { "name": "[oss-security] 20140930 vulnerability in rsyslog", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/09/30/15" }, { "name": "61494", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61494" }, { "name": "[oss-security] 20141003 sysklogd vulnerability (CVE-2014-3634)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/10/03/1" }, { "name": "http://www.rsyslog.com/remote-syslog-pri-vulnerability-cve-2014-3683/", "refsource": "CONFIRM", "url": "http://www.rsyslog.com/remote-syslog-pri-vulnerability-cve-2014-3683/" }, { "name": "USN-2381-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2381-1" }, { "name": "DSA-3047", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3047" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3683", "datePublished": "2014-11-02T00:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:50:18.315Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-5617
Vulnerability from cvelistv5
Published
2008-12-17 02:00
Modified
2024-08-07 10:56
Severity ?
EPSS score ?
Summary
The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.
References
▼ | URL | Tags |
---|---|---|
http://www.rsyslog.com/Article327.phtml | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47080 | vdb-entry, x_refsource_XF | |
http://www.rsyslog.com/Article322.phtml | x_refsource_CONFIRM | |
http://www.rsyslog.com/Topic4.phtml | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/32630 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/32857 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:56:47.372Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rsyslog.com/Article327.phtml" }, { "name": "rsyslog-allowedsender-security-bypass(47080)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47080" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rsyslog.com/Article322.phtml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rsyslog.com/Topic4.phtml" }, { "name": "32630", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32630" }, { "name": "32857", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32857" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rsyslog.com/Article327.phtml" }, { "name": "rsyslog-allowedsender-security-bypass(47080)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47080" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rsyslog.com/Article322.phtml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rsyslog.com/Topic4.phtml" }, { "name": "32630", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32630" }, { "name": "32857", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32857" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5617", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.rsyslog.com/Article327.phtml", "refsource": "CONFIRM", "url": "http://www.rsyslog.com/Article327.phtml" }, { "name": "rsyslog-allowedsender-security-bypass(47080)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47080" }, { "name": "http://www.rsyslog.com/Article322.phtml", "refsource": "CONFIRM", "url": "http://www.rsyslog.com/Article322.phtml" }, { "name": "http://www.rsyslog.com/Topic4.phtml", "refsource": "CONFIRM", "url": "http://www.rsyslog.com/Topic4.phtml" }, { "name": "32630", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32630" }, { "name": "32857", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32857" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5617", "datePublished": "2008-12-17T02:00:00", "dateReserved": "2008-12-16T00:00:00", "dateUpdated": "2024-08-07T10:56:47.372Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-3243
Vulnerability from cvelistv5
Published
2017-07-25 18:00
Modified
2024-08-06 05:39
Severity ?
EPSS score ?
Summary
rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/75298 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1032885 | vdb-entry, x_refsource_SECTRACK | |
http://www.openwall.com/lists/oss-security/2015/06/20/3 | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=1232826 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/06/18/12 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:32.044Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "75298", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75298" }, { "name": "1032885", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032885" }, { "name": "[oss-security] 20150620 Re: CVE-2015-3243 rsyslog: some log files are created world-readable", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/06/20/3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1232826" }, { "name": "[oss-security] 20150618 CVE-2015-3243 rsyslog: some log files are created world-readable", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/06/18/12" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-25T17:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "75298", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75298" }, { "name": "1032885", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032885" }, { "name": "[oss-security] 20150620 Re: CVE-2015-3243 rsyslog: some log files are created world-readable", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/06/20/3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1232826" }, { "name": "[oss-security] 20150618 CVE-2015-3243 rsyslog: some log files are created world-readable", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/06/18/12" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-3243", "datePublished": "2017-07-25T18:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:32.044Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2019-11-14 02:15
Modified
2024-11-21 01:26
Severity ?
Summary
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rsyslog | rsyslog | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
opensuse | opensuse | 11.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "matchCriteriaId": "22CBAD75-300B-4E25-B694-292C911A02E8", "versionEndExcluding": "5.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset" }, { "lang": "es", "value": "Se encontr\u00f3 una p\u00e9rdida de memoria en rsyslog versiones anteriores a la versi\u00f3n 5.7.6, en la manera en que son registrados los mensajes de log procesados ??en el demonio cuando se utilizan m\u00faltiples conjuntos de reglas y algunos lotes de salida conten\u00edan mensajes que pertenecen a m\u00e1s de un conjunto de reglas. Un atacante local podr\u00eda causar una denegaci\u00f3n de servicio del demonio rsyslogd mediante un mensaje de registro que pertenece a m\u00e1s de un conjunto de reglas" } ], "id": "CVE-2011-1490", "lastModified": "2024-11-21T01:26:25.943", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T02:15:10.843", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2011-1490" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1490" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2011-1490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1490" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-772" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-09-30 14:15
Modified
2024-11-21 04:31
Severity ?
Summary
contrib/pmdb2diag/pmdb2diag.c in Rsyslog v8.1908.0 allows out-of-bounds access because the level length is mishandled.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.1908.0:*:*:*:*:*:*:*", "matchCriteriaId": "16D5FAE8-E262-4E94-8B77-A555FF23198F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "contrib/pmdb2diag/pmdb2diag.c in Rsyslog v8.1908.0 allows out-of-bounds access because the level length is mishandled." }, { "lang": "es", "value": "El archivo contrib/pmdb2diag/pmdb2diag.c en Rsyslog versi\u00f3n v8.1908.0, permite el acceso fuera de l\u00edmites porque la longitud del nivel se maneja inapropiadamente." } ], "id": "CVE-2019-17040", "lastModified": "2024-11-21T04:31:34.727", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-30T14:15:14.873", "references": [ { "source": "cve@mitre.org", "url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/pull/3875" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/pull/3875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-10-04 17:55
Modified
2024-11-21 01:56
Severity ?
Summary
Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rsyslog | rsyslog | * | |
rsyslog | rsyslog | * | |
rsyslog | rsyslog | 6.4.2 | |
rsyslog | rsyslog | 6.5.1 | |
rsyslog | rsyslog | 6.6.0 | |
rsyslog | rsyslog | 7.1.0 | |
rsyslog | rsyslog | 7.1.1 | |
rsyslog | rsyslog | 7.1.2 | |
rsyslog | rsyslog | 7.1.3 | |
rsyslog | rsyslog | 7.1.4 | |
rsyslog | rsyslog | 7.1.5 | |
rsyslog | rsyslog | 7.1.6 | |
rsyslog | rsyslog | 7.1.7 | |
rsyslog | rsyslog | 7.1.8 | |
rsyslog | rsyslog | 7.1.9 | |
rsyslog | rsyslog | 7.1.10 | |
rsyslog | rsyslog | 7.1.11 | |
rsyslog | rsyslog | 7.1.12 | |
rsyslog | rsyslog | 7.2.1 | |
rsyslog | rsyslog | 7.2.2 | |
rsyslog | rsyslog | 7.2.3 | |
rsyslog | rsyslog | 7.2.4 | |
rsyslog | rsyslog | 7.2.5 | |
rsyslog | rsyslog | 7.2.6 | |
rsyslog | rsyslog | 7.2.7 | |
rsyslog | rsyslog | 7.3.0 | |
rsyslog | rsyslog | 7.3.1 | |
rsyslog | rsyslog | 7.3.3 | |
rsyslog | rsyslog | 7.3.4 | |
rsyslog | rsyslog | 7.3.5 | |
rsyslog | rsyslog | 7.3.6 | |
rsyslog | rsyslog | 7.3.7 | |
rsyslog | rsyslog | 7.3.8 | |
rsyslog | rsyslog | 7.3.9 | |
rsyslog | rsyslog | 7.3.10 | |
rsyslog | rsyslog | 7.3.11 | |
rsyslog | rsyslog | 7.3.12 | |
rsyslog | rsyslog | 7.3.13 | |
rsyslog | rsyslog | 7.3.14 | |
rsyslog | rsyslog | 7.3.15 | |
rsyslog | rsyslog | 7.4.0 | |
rsyslog | rsyslog | 7.5.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDE20FE1-56D8-4D3C-B4A2-EE2B75ACFA62", "versionEndIncluding": "7.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:*:devel:*:*:*:*:*:*", "matchCriteriaId": "1D028081-DAF7-4D78-872C-C13F83680212", "versionEndIncluding": "7.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:6.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "9508A76B-701A-4C14-9C04-4E28929BDA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "93CD9481-10CF-43FF-83FA-D2DA2AF511FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:6.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "FF4C2FA1-BAFC-434C-82EA-66F184188E23", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F42492F4-4733-4B79-A772-E1FEE6B94720", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8641BF6-2DA2-4921-96C1-75BE79C53848", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F784088F-B978-4884-A8DB-78EF80D8F084", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "D32E4647-4082-4570-90A4-C99B5C10FB19", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "DBF9A496-300B-4BA8-B0D1-8C462433E0F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CFC40422-9D3D-4716-8330-AF1BE9D4EBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "49182E05-9A60-42A6-ABB1-CFB451E536FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "1CBB1158-43C3-4F96-B417-BD666E28527F", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "F58E1519-3A26-44BB-825C-C0101A7EC10D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "025343ED-25A7-4CED-BEE9-38F9D8341204", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "19D99873-FC74-4F40-B96E-8947FAFAA4CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "C022D5B9-69A8-4C2D-9CEE-B286E6A60443", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "EB52D577-3BB4-484A-A6E8-2A3C1231A4E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "850B5013-FD12-48A3-8F42-131799BCE0B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "06E2C187-A323-45F8-B3E9-B770794616B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "9B398B42-77D8-4992-89B4-386010147157", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "286C77D0-7533-41F8-B642-74F737D030EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "21BC8875-9FB0-4201-8830-F041661A5851", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "1B0E74D0-224C-4B57-B08C-D4F19B0E65B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1340BDF8-AA43-4425-8EFC-0AD4FD817DAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "70DC0961-7D16-4516-A70C-BB8D1ECD1FB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F054055F-C59C-41C1-8D80-BFDBA4BE9C6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C37CE69F-78BF-4925-9234-B982B17A105E", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "95C631DA-E2C3-47F0-A6E2-3B95B8AEDA0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "BD56EDED-77B4-4C85-8834-3604166B7EB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "DB8A679D-419D-4BDE-BE77-559B53DBF5F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "E72910C5-E19F-43E9-B595-C9232CA13430", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "B2E08CC5-03FC-439B-87FF-0AA79E01D0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "EB5A9B69-DA3A-466C-B2BC-15ADA9BBD459", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "954DD01D-03A1-4341-9819-AF0A65C61C96", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "285A3697-88C6-4C8D-8CF3-914F3697B8EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "D38F1301-0496-4F61-9927-CB49AE5D66EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "30D1A318-63A8-47DB-927C-DD39198CFDA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "AE21440E-B44A-4A77-B9D8-F984C349C8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "58D966D4-A2BB-4864-B910-D73BB3E91950", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F2767E8-6834-4EDD-BFC6-BDCE1FBDB5F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:7.5.0:devel:*:*:*:*:*:*", "matchCriteriaId": "1F459606-1598-47F8-A031-51B6F49D6244", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response." }, { "lang": "es", "value": "Vulnerabilidad de doble liberaci\u00f3n en la funci\u00f3n writeDataError en el plugin Elasticsearch (omelasticsearch) en rsyslog anterior a 7.4.2 y anterior a 7.5.2 devel, cuando un errorfile se establece en el registro de log local, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de una respuesta JSON dise\u00f1ada." } ], "id": "CVE-2013-4758", "lastModified": "2024-11-21T01:56:19.563", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-10-04T17:55:09.947", "references": [ { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2013/07/05/2" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.rsyslog.com/rsyslog-7-4-2-v7-stable-released/" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.rsyslog.com/rsyslog-7-5-2-v7-devel-released/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2013/07/05/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.rsyslog.com/rsyslog-7-4-2-v7-stable-released/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.rsyslog.com/rsyslog-7-5-2-v7-devel-released/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-08-06 14:29
Modified
2024-12-27 16:15
Severity ?
Summary
The zmq3 input and output modules in rsyslog before 8.28.0 interpreted description fields as format strings, possibly allowing a format string attack with unspecified impact.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/rsyslog/rsyslog/blob/master/ChangeLog | Release Notes, Third Party Advisory | |
cve@mitre.org | https://github.com/rsyslog/rsyslog/commit/062d0c671a29f7c6f7dff4a2f1f35df375bbb30b | Third Party Advisory | |
cve@mitre.org | https://github.com/rsyslog/rsyslog/pull/1565 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rsyslog/rsyslog/blob/master/ChangeLog | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rsyslog/rsyslog/commit/062d0c671a29f7c6f7dff4a2f1f35df375bbb30b | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rsyslog/rsyslog/pull/1565 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20241227-0009/ |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "matchCriteriaId": "43786829-C62D-4802-A45E-19C23E1A8DBA", "versionEndIncluding": "8.27.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The zmq3 input and output modules in rsyslog before 8.28.0 interpreted description fields as format strings, possibly allowing a format string attack with unspecified impact." }, { "lang": "es", "value": "Los m\u00f3dulos de entrada y salida de zmq3 en versiones de rsyslog anteriores a 8.28.0 interpretaban campos de descripci\u00f3n como cadenas de formato, lo que pod\u00eda dar lugar a un ataque de tipo \u201cformat string\u201d y causar un impacto no especificado." } ], "id": "CVE-2017-12588", "lastModified": "2024-12-27T16:15:21.503", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-06T14:29:00.227", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/blob/master/ChangeLog" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/commit/062d0c671a29f7c6f7dff4a2f1f35df375bbb30b" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/pull/1565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/blob/master/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/commit/062d0c671a29f7c6f7dff4a2f1f35df375bbb30b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/pull/1565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20241227-0009/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-134" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-01-25 18:29
Modified
2024-11-21 03:53
Severity ?
Summary
A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to crash. Versions before 8.27.0 are vulnerable.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "matchCriteriaId": "09D6181E-8ED9-43C4-9393-FE7780EC919C", "versionEndExcluding": "8.27.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:virtualization_manager:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "9FA1A18F-D997-4121-A01B-FD9B3BF266CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "566507B6-AC95-47F7-A3FB-C6F414E45F51", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CDCFF34-6F1D-45A1-BE37-6A0E17B04801", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4A684C7-88FD-43C4-9BDB-AE337FCBD0AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "37CE1DC7-72C5-483C-8921-0B462C8284D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BBD7A51-0590-4DDF-8249-5AFA8D645CB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "BB28F9AF-3D06-4532-B397-96D7E4792503", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to crash. Versions before 8.27.0 are vulnerable." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en rsyslog en el m\u00f3dulo imptcp. Un atacante podr\u00eda enviar un mensaje especialmente manipulado al socket imptcp, lo que conducir\u00eda al cierre forzado de rsyslog. Las versiones anteriores a la 8.27.0 son vulnerables." } ], "id": "CVE-2018-16881", "lastModified": "2024-11-21T03:53:31.293", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "secalert@redhat.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-25T18:29:00.257", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:2501" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2110" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2437" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2439" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16881" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:2501" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2437" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00028.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-07-25 18:29
Modified
2024-11-21 02:28
Severity ?
Summary
rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:-:*:*:*:*:*:*:*", "matchCriteriaId": "0766F45D-73A5-40C7-BBA1-1251460E3970", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron." }, { "lang": "es", "value": "rsyslog utiliza permisos d\u00e9biles para generar archivos de registro, lo que permite a los usuarios locales obtener informaci\u00f3n confidencial mediante la lectura de archivos en /var/log/cron." } ], "id": "CVE-2015-3243", "lastModified": "2024-11-21T02:28:58.867", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-07-25T18:29:00.493", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "VDB Entry" ], "url": "http://www.openwall.com/lists/oss-security/2015/06/18/12" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "VDB Entry" ], "url": "http://www.openwall.com/lists/oss-security/2015/06/20/3" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/75298" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032885" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1232826" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "VDB Entry" ], "url": "http://www.openwall.com/lists/oss-security/2015/06/18/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "VDB Entry" ], "url": "http://www.openwall.com/lists/oss-security/2015/06/20/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/75298" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032885" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1232826" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-09-25 23:55
Modified
2024-11-21 01:32
Severity ?
Summary
Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "841185A1-0CD7-4965-A40A-45836037B910", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4AB0A79C-E420-468E-9388-5E19EA54EA89", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "34C010EA-3A59-4D2E-93CB-9C341B954ED4", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1C94467B-F849-4400-8385-B7906C705278", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "78820540-0924-4991-8588-98B3D8073C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "374E62FF-AAFA-4D67-868A-AA04F36342E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "E3661AC6-F94D-4172-AB47-703FB9C0ABA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "6009D909-1741-4859-A218-B218A44785E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1D1E4A0B-C05F-479D-97D2-6CB3246000BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "B837CDD0-4026-46D6-A92E-7BB978F98B4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9C8C51A8-3967-4B52-ABDE-8C53EE99BF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "5988F88B-273F-4F1F-BAB2-3C29AE926EEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "5EAB8FF7-3352-48AA-B2F7-4DF8EB7C309E", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4B29847C-783E-4518-9F11-9E011B04EB82", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "8780325E-72C5-41C0-AE27-84849C6916CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "9905CA1B-D0C6-4F71-AF93-D0FD4E083EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "79E83912-6BC8-47C4-B45D-E3D91A7FDC12", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "8C7B6A58-F1E3-4505-9271-6CBBB2EA7646", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "35DF0979-6A93-46F2-808D-7C401014D97A", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C8CA895C-6D01-46BE-8FA0-710F67710CD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "8F122977-A2F5-41AC-BCAD-FDBAF6544514", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "C9C2EE07-2385-40B3-B98B-2701ECE662CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "3F192D2B-F1DB-4E5F-A0A3-7F7A34F9E13C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "F593F49F-3B11-4203-84CC-EE1B22C80304", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C189E19A-16F3-40C9-B480-58013C5ED16D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0839E9A-147E-4297-AE06-34AC67471001", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "5A7D9B57-777D-4B0F-BFD0-2642064FFBFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "654A4E45-2E4D-420D-8653-B03240ED4A88", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CF03E62D-026D-4C33-BB0D-9D5B788DC5C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "32DE7607-0082-4013-812B-0777C23BA1AC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "662C8A8F-E0D0-46C1-9918-24A8CA998A7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "77853E52-17B9-46E2-AF47-15B0B54498C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D36B64B8-06C6-4C14-A240-D3116FAF9025", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "7FCCE757-93EC-47F7-AEB4-B7F3F2F77EE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "83EC6852-0309-4652-94E9-F44E77EF72A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "5E14CB63-62A5-4264-94A1-B03560A523ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1BF47C64-6992-4ED1-A903-D0F753A95D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E8B8362-FB8A-47E0-AC3D-DC6A1138758D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "72D612FA-5842-400D-AADA-D2CFF3A9C2B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "41A66E91-25CA-48D9-9876-B7BF59E24002", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "52FD86EF-92A1-4FB4-9EC1-E6DFBD93499B", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "AC62EFFF-52BB-4B75-811B-90FABA83FF33", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "31115B81-97B1-49DB-B524-1F3234F3B999", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F28E8B1-0266-4498-B255-A05B7FE22F84", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "E4CECA40-8267-4791-90B2-06311D33D73C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "298BE072-6C64-4AB4-AE92-16C6ADD3B7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "4338B0BD-6F52-405B-AED9-2ED2B4B50AC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0E9CDDD7-F22B-4980-BD0A-7F91E9B9D384", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4CE7FF76-4F5E-4D0E-AF9A-8579C93FA472", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "3AF97FDB-8862-44BA-9732-15191AC8181E", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "962616FC-9BB4-4978-8011-6084931A2CD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "83F00805-390F-4736-894E-1F5CEB1F1629", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DB45F90-FD8E-4ABA-8C26-D3A49CA684D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E0ED3A21-75EF-438C-AC9E-1CA67985DC46", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11421-19E4-4DE4-849E-96BC2045CEEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F98CEA8A-814C-4812-9E10-874CB0967303", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "2F5141AA-FE13-4AE7-9F5A-873CDFDA5B2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "2E985BF5-8B9E-45C1-ADC1-B5F964EABD5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE7EC105-0E13-4D47-9D0A-315013657DA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0244736-F857-4A74-84E4-BB7F591CE7F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3607C1AE-E3C8-4786-8EEE-0B1D1A9B098C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "2D28F99E-27B8-47F8-981A-5D9E38BEADE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "6BA11F46-D8FE-44BD-B792-A78800AC46A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "A1FC9D6A-3E72-4E93-8EC7-A82A24F3E73E", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C0FAF7B-3BDB-4048-9040-B65145CA0267", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "995DAD4E-7B30-474C-A06C-4D5AA57071C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "A0107C61-B60E-4BC9-8D97-D1CB02B37F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "218031FE-C023-4637-B4CA-EC2B7633D84E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A7D4609D-5FE8-4EDB-87DA-C3F308604721", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9D9461EE-66F3-445A-A556-9115CCD9CA7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C11B843B-1386-4987-9747-F047467C5F4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "59CDD3CE-1746-4338-91E9-63E288975A1D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow." }, { "lang": "es", "value": "Desbordamiento de entero en la funci\u00f3n rsCStrExtendBuf en runtime/stringbuf.c en el m\u00f3dulo imfile en rsyslog v4.x anteriores v4.6.6, v5.x anteriores a v5.7.4, y v6.x anteriores a v6.1.4, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (cuelgue del demonio) a trav\u00e9s de un fichero grande, que provoca un desbordamiento de b\u00fafer basado en memoria din\u00e1mica." } ], "id": "CVE-2011-4623", "lastModified": "2024-11-21T01:32:41.153", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-09-25T23:55:01.033", "references": [ { "source": "secalert@redhat.com", "url": "http://bugzilla.adiscon.com/show_bug.cgi?id=221" }, { "source": "secalert@redhat.com", "url": "http://git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=6bad782f154b7f838c7371bf99c13f6dc4ec4101" }, { "source": "secalert@redhat.com", "url": "http://rsyslog.com/changelog-for-4-6-6-v4-stable/" }, { "source": "secalert@redhat.com", "url": "http://rsyslog.com/changelog-for-5-7-4-v5-beta/" }, { "source": "secalert@redhat.com", "url": "http://rsyslog.com/changelog-for-6-1-4-devel/" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45848" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47698" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2011/12/22/2" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/51171" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1026556" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1338-1" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769822" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugzilla.adiscon.com/show_bug.cgi?id=221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=6bad782f154b7f838c7371bf99c13f6dc4ec4101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rsyslog.com/changelog-for-4-6-6-v4-stable/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rsyslog.com/changelog-for-5-7-4-v5-beta/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rsyslog.com/changelog-for-6-1-4-devel/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45848" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47698" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2011/12/22/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/51171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026556" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1338-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769822" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-14 02:15
Modified
2024-11-21 01:26
Severity ?
Summary
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent within short periods of time.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rsyslog | rsyslog | * | |
opensuse | opensuse | 11.4 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "matchCriteriaId": "22CBAD75-300B-4E25-B694-292C911A02E8", "versionEndExcluding": "5.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent within short periods of time." }, { "lang": "es", "value": "Se encontr\u00f3 una p\u00e9rdida de memoria en rsyslog versiones anteriores a la versi\u00f3n 5.7.6, en la manera en que son registrados los mensajes de log procesados ??en el demonio cuando $RepeatedMsgReduction fue habilitada. Un atacante local podr\u00eda usar este fallo para causar una denegaci\u00f3n de servicio del demonio de rsyslogd al bloquear el servicio mediante una secuencia de mensajes de log repetidos enviados dentro de per\u00edodos cortos de tiempo." } ], "id": "CVE-2011-1488", "lastModified": "2024-11-21T01:26:25.703", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T02:15:10.717", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2011-1488" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1488" }, { "source": "secalert@redhat.com", "url": "https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1488" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2011-1488" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1488" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1488" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-772" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-09-06 16:55
Modified
2024-11-21 01:29
Severity ?
Summary
Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C189E19A-16F3-40C9-B480-58013C5ED16D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0839E9A-147E-4297-AE06-34AC67471001", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "5A7D9B57-777D-4B0F-BFD0-2642064FFBFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "654A4E45-2E4D-420D-8653-B03240ED4A88", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CF03E62D-026D-4C33-BB0D-9D5B788DC5C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "32DE7607-0082-4013-812B-0777C23BA1AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "C19BCBF2-09C1-4B2E-90C0-44086BCF5643", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "C8C0123D-3D76-418D-BE38-00C10F147DA3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E8B8362-FB8A-47E0-AC3D-DC6A1138758D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "72D612FA-5842-400D-AADA-D2CFF3A9C2B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "41A66E91-25CA-48D9-9876-B7BF59E24002", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "52FD86EF-92A1-4FB4-9EC1-E6DFBD93499B", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "AC62EFFF-52BB-4B75-811B-90FABA83FF33", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "31115B81-97B1-49DB-B524-1F3234F3B999", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F28E8B1-0266-4498-B255-A05B7FE22F84", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "E4CECA40-8267-4791-90B2-06311D33D73C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "298BE072-6C64-4AB4-AE92-16C6ADD3B7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "4338B0BD-6F52-405B-AED9-2ED2B4B50AC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0E9CDDD7-F22B-4980-BD0A-7F91E9B9D384", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4CE7FF76-4F5E-4D0E-AF9A-8579C93FA472", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "3AF97FDB-8862-44BA-9732-15191AC8181E", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "962616FC-9BB4-4978-8011-6084931A2CD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "83F00805-390F-4736-894E-1F5CEB1F1629", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DB45F90-FD8E-4ABA-8C26-D3A49CA684D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E0ED3A21-75EF-438C-AC9E-1CA67985DC46", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11421-19E4-4DE4-849E-96BC2045CEEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F98CEA8A-814C-4812-9E10-874CB0967303", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "2F5141AA-FE13-4AE7-9F5A-873CDFDA5B2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "2E985BF5-8B9E-45C1-ADC1-B5F964EABD5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE7EC105-0E13-4D47-9D0A-315013657DA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0244736-F857-4A74-84E4-BB7F591CE7F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3607C1AE-E3C8-4786-8EEE-0B1D1A9B098C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "2D28F99E-27B8-47F8-981A-5D9E38BEADE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "6BA11F46-D8FE-44BD-B792-A78800AC46A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "A1FC9D6A-3E72-4E93-8EC7-A82A24F3E73E", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C0FAF7B-3BDB-4048-9040-B65145CA0267", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "995DAD4E-7B30-474C-A06C-4D5AA57071C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "A0107C61-B60E-4BC9-8D97-D1CB02B37F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "218031FE-C023-4637-B4CA-EC2B7633D84E", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9DF6D59-AC76-4C98-A878-B618CEE59E6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "826FCA60-5D6D-4606-9024-E005C6FA6170", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "BE08A955-0416-41AF-AFD4-8E065A1E1A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "E6BA5F54-DAFC-48DA-BFD6-EB1414F55391", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "2ADD25C5-1729-4C06-BCC5-27A99A665E51", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "16EACD36-04B0-4D5F-B7E3-E625CCE445E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "91B8BDF5-7427-4421-8E66-568FC2FC2EEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB647DD4-31EC-40E5-B9A7-73A6C213D3B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CA66A00-FB7A-4040-B8FC-9B6C48357C7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "C1EEEC6D-C50B-4C40-83E1-A8FBD813CB04", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F12BBF6-985F-4A29-9968-CFE440885BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "ABE8ABAF-41AA-43D9-B72B-57C27059C2C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer basado en la pila en la funci\u00f3n parseLegacySyslogMsg en tools/syslogd.c en rsyslogd en rsyslog v4.6.x antes de v4.6.8 y v5.2.0 hasta la v5.8.4 podr\u00eda permitir a atacantes remotos provocar una denegaci\u00f3n de servicio (salida de la aplicaci\u00f3n) a trav\u00e9s de un TAG demasiado largo en un mensaje de syslog antiguo." } ], "id": "CVE-2011-3200", "lastModified": "2024-11-21T01:29:57.957", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-09-06T16:55:10.837", "references": [ { "source": "secalert@redhat.com", "url": "http://git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=1ca6cc236d1dabf1633238b873fb1c057e52f95e" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065837.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065941.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2011-09/msg00013.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/45922" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/46027" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1026000" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:134" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-1247.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.rsyslog.com/potential-dos-with-malformed-tag/" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/49413" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727644" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=1ca6cc236d1dabf1633238b873fb1c057e52f95e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065837.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065941.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2011-09/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/45922" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/46027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1026000" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-1247.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.rsyslog.com/potential-dos-with-malformed-tag/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/49413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727644" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-07 16:15
Modified
2024-11-21 04:31
Severity ?
Summary
An issue was discovered in Rsyslog v8.1908.0. contrib/pmcisconames/pmcisconames.c has a heap overflow in the parser for Cisco log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon), but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rsyslog | rsyslog | 8.1908.0 | |
fedoraproject | fedora | 30 | |
fedoraproject | fedora | 31 | |
debian | debian_linux | 9.0 | |
opensuse | leap | 15.0 | |
opensuse | leap | 15.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.1908.0:*:*:*:*:*:*:*", "matchCriteriaId": "16D5FAE8-E262-4E94-8B77-A555FF23198F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Rsyslog v8.1908.0. contrib/pmcisconames/pmcisconames.c has a heap overflow in the parser for Cisco log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon), but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Rsyslog versi\u00f3n v8.1908.0. El archivo contrib/pmcisconames/pmcisconames.c, presenta un desbordamiento de pila en el analizador de mensajes de registro de Cisco. El analizador intenta localizar un delimitador de mensaje de registro (en este caso, un espacio o dos puntos), pero no considera las cadenas que no satisfacen esta restricci\u00f3n. Si la cadena no coincide, la variable lenMsg alcanzar\u00e1 el valor cero y omitir\u00e1 la comprobaci\u00f3n de saneamiento que detecta mensajes de registro no v\u00e1lidos. El mensaje se considerar\u00e1 v\u00e1lido y el analizador consumir\u00e1 el delimitador de dos puntos inexistentes. Al hacerlo, disminuir\u00e1 lenMsg, un entero con signo, cuyo valor era cero y ahora se convierte en menos uno. El siguiente paso en el analizador es desplazar a la izquierda el contenido del mensaje. Para hacer esto, llamar\u00e1 a memmove con los punteros correctos para las cadenas de destino y apuntadas, pero el lenMsg ahora ser\u00e1 interpretado como un gran valor, causando un desbordamiento de la pila." } ], "id": "CVE-2019-17042", "lastModified": "2024-11-21T04:31:35.040", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-07T16:15:11.647", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/pull/3883" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/pull/3883" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-07 16:15
Modified
2024-11-21 04:31
Severity ?
Summary
An issue was discovered in Rsyslog v8.1908.0. contrib/pmaixforwardedfrom/pmaixforwardedfrom.c has a heap overflow in the parser for AIX log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon) but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rsyslog | rsyslog | 8.1908.0 | |
debian | debian_linux | 9.0 | |
fedoraproject | fedora | 30 | |
fedoraproject | fedora | 31 | |
opensuse | leap | 15.0 | |
opensuse | leap | 15.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.1908.0:*:*:*:*:*:*:*", "matchCriteriaId": "16D5FAE8-E262-4E94-8B77-A555FF23198F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Rsyslog v8.1908.0. contrib/pmaixforwardedfrom/pmaixforwardedfrom.c has a heap overflow in the parser for AIX log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon) but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Rsyslog versi\u00f3n v8.1908.0. El archivo contrib/pmaixforwardsfrom/pmaixforwardsfrom.c presenta un desbordamiento de la pila en el analizador para mensajes de registro de AIX. El analizador intenta localizar un delimitador de mensaje de registro (en este caso, un espacio o dos puntos) pero no considera las cadenas que no satisfacen esta restricci\u00f3n. Si la cadena no coincide, la variable lenMsg alcanzar\u00e1 el valor cero y omitir\u00e1 la comprobaci\u00f3n de saneamiento que detecta mensajes de registro no v\u00e1lidos. El mensaje entonces se considerar\u00e1 v\u00e1lido y el analizador consumir\u00e1 el delimitador de dos puntos inexistentes. Al hacerlo, disminuir\u00e1 lenMsg, un entero con signo, cuyo valor era cero y ahora se convierte en menos uno. El siguiente paso en el analizador es desplazar a la izquierda el contenido del mensaje. Para hacer esto, llamar\u00e1 a memmove con los punteros correctos para las cadenas de destino y apuntadas, pero el lenMsg ahora ser\u00e1 interpretado como un gran valor, causando un desbordamiento de la pila." } ], "id": "CVE-2019-17041", "lastModified": "2024-11-21T04:31:34.877", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-07T16:15:11.583", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/pull/3884" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/pull/3884" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-12-17 02:30
Modified
2024-11-21 00:54
Severity ?
Summary
The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rsyslog | rsyslog | 3.12.1 | |
rsyslog | rsyslog | 3.12.2 | |
rsyslog | rsyslog | 3.12.3 | |
rsyslog | rsyslog | 3.12.4 | |
rsyslog | rsyslog | 3.12.5 | |
rsyslog | rsyslog | 3.13.0 | |
rsyslog | rsyslog | 3.15.0 | |
rsyslog | rsyslog | 3.15.1 | |
rsyslog | rsyslog | 3.17.0 | |
rsyslog | rsyslog | 3.17.1 | |
rsyslog | rsyslog | 3.17.4 | |
rsyslog | rsyslog | 3.17.5 | |
rsyslog | rsyslog | 3.19.0 | |
rsyslog | rsyslog | 3.19.1 | |
rsyslog | rsyslog | 3.19.2 | |
rsyslog | rsyslog | 3.19.3 | |
rsyslog | rsyslog | 3.19.4 | |
rsyslog | rsyslog | 3.19.5 | |
rsyslog | rsyslog | 3.19.6 | |
rsyslog | rsyslog | 3.19.7 | |
rsyslog | rsyslog | 3.19.8 | |
rsyslog | rsyslog | 3.19.9 | |
rsyslog | rsyslog | 3.19.10 | |
rsyslog | rsyslog | 3.19.11 | |
rsyslog | rsyslog | 3.19.12 | |
rsyslog | rsyslog | 3.20.0 | |
rsyslog | rsyslog | 4.1.0 | |
rsyslog | rsyslog | 4.1.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "89BF4CB5-5DBF-4D3F-BB71-EAA44A433D9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "AFB62852-2AB0-4DD8-8742-8852E35680BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "B1CD4DC0-12FC-49C5-B2A0-2934ADFEC45C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.12.4:*:*:*:*:*:*:*", "matchCriteriaId": "E4F8C757-DC7C-4611-BFB3-E2D909EBAFA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "B4268BBF-CEFE-4DC0-A540-20BDA4F61BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "B2ADEB3C-EC09-404B-B301-CF67106EC98C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "FE774463-3916-4BF5-A8C5-796CD1FD4AFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.15.1:beta:*:*:*:*:*:*", "matchCriteriaId": "ECAECD24-A1B6-4B51-93D4-64CCEEDEB5CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E9185C1-A2A4-490B-B054-DE337D4BBAF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "0831F7D3-6E65-4D92-8295-64F0649EDA2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.17.4:beta:*:*:*:*:*:*", "matchCriteriaId": "D9EBE646-1515-4E30-8D6B-B5320A07F798", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.17.5:beta:*:*:*:*:*:*", "matchCriteriaId": "12E5FB1C-08E9-4597-B729-9E9D7C7BBC5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDA49F2C-F679-4CB6-912F-E1C8F23C3E9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "5EE3C64E-1596-4AF8-A335-0BDDC9A47C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "C016F6A1-83BF-4ED7-B811-44DB7B19B60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "2A3A2E1E-7492-486A-916F-B9DDD0E2810C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "FDE04C46-348E-4772-BDFC-7A43399741E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "37C49996-20B7-4763-AA6A-92EFDA69CF6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.19.6:*:*:*:*:*:*:*", "matchCriteriaId": "947E1B5B-E1F7-4770-9163-E8583F631810", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.19.7:*:*:*:*:*:*:*", "matchCriteriaId": "89608E18-768A-4EA1-BEC2-05DEA93C85AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.19.8:*:*:*:*:*:*:*", "matchCriteriaId": "B64A837C-553D-433A-9904-FAE91B897DD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.19.9:*:*:*:*:*:*:*", "matchCriteriaId": "5907B692-CCD4-40E8-B5FC-E0606996F044", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.19.10:*:*:*:*:*:*:*", "matchCriteriaId": "90C6D691-8ACB-497C-B90B-CAEDE54965B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.19.11:*:*:*:*:*:*:*", "matchCriteriaId": "6C042D96-9BB4-40F5-B752-0F1DE06BA458", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.19.12:*:*:*:*:*:*:*", "matchCriteriaId": "EA326A8D-069A-4C60-B1E8-D83CD2E70DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "47275436-0B5A-4BC6-A3F6-2232BF8D36D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "841185A1-0CD7-4965-A40A-45836037B910", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4AB0A79C-E420-468E-9388-5E19EA54EA89", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages." }, { "lang": "es", "value": "El manejador ACL de rsyslog v3.12.1 hasta v3.20.0, v4.1.0 y v4.1.1, no sigue la directiva $AllowSender, lo que permite a atacantes remotos evitar las restricciones de acceso pretendidas y falsear los mensajes de registro (log) o crear un gran n\u00famero de mensajes falsos." } ], "id": "CVE-2008-5617", "lastModified": "2024-11-21T00:54:27.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 7.8, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-12-17T02:30:00.203", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32857" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.rsyslog.com/Article322.phtml" }, { "source": "cve@mitre.org", "url": "http://www.rsyslog.com/Article327.phtml" }, { "source": "cve@mitre.org", "url": "http://www.rsyslog.com/Topic4.phtml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/32630" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32857" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.rsyslog.com/Article322.phtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.rsyslog.com/Article327.phtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.rsyslog.com/Topic4.phtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/32630" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47080" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Not vulnerable. This issue did not affect the version of the rsyslog package, as shipped with Red Hat Enterprise Linux 5.", "lastModified": "2008-12-17T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-02 00:55
Modified
2024-11-21 02:08
Severity ?
Summary
rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sysklogd_project | sysklogd | * | |
sysklogd_project | sysklogd | 1.1 | |
sysklogd_project | sysklogd | 1.2 | |
sysklogd_project | sysklogd | 1.3 | |
sysklogd_project | sysklogd | 1.4 | |
sysklogd_project | sysklogd | 1.4.1 | |
rsyslog | rsyslog | * | |
rsyslog | rsyslog | 8.1.0 | |
rsyslog | rsyslog | 8.1.1 | |
rsyslog | rsyslog | 8.1.2 | |
rsyslog | rsyslog | 8.1.3 | |
rsyslog | rsyslog | 8.1.4 | |
rsyslog | rsyslog | 8.1.5 | |
rsyslog | rsyslog | 8.1.6 | |
rsyslog | rsyslog | 8.2.0 | |
rsyslog | rsyslog | 8.2.1 | |
rsyslog | rsyslog | 8.2.2 | |
rsyslog | rsyslog | 8.2.3 | |
rsyslog | rsyslog | 8.3.0 | |
rsyslog | rsyslog | 8.3.1 | |
rsyslog | rsyslog | 8.3.2 | |
rsyslog | rsyslog | 8.3.3 | |
rsyslog | rsyslog | 8.3.4 | |
rsyslog | rsyslog | 8.3.5 | |
rsyslog | rsyslog | 8.4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysklogd_project:sysklogd:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8153176-4736-4C00-AEDA-B0C399CEF0FE", "versionEndIncluding": "1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sysklogd_project:sysklogd:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7134FB84-BF8E-4044-9DF1-FB006CAEB82D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sysklogd_project:sysklogd:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "7F8D4E4C-0BFB-4DA8-8A04-03F4BE1FBA6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sysklogd_project:sysklogd:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "4828D8F7-C422-453D-947F-2DA7FD7CE2FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sysklogd_project:sysklogd:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "34FBFC21-907B-44C7-92D7-7533CA869F1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sysklogd_project:sysklogd:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "CF0B6E60-34CB-4AEB-898C-92B89397D913", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA324C56-7C20-448A-964C-E93F1EA126EC", "versionEndIncluding": "7.6.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "36DC9B2C-6F7E-4EB4-9C0F-1A64F4D26988", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D3999B54-9597-435C-A1D3-63056A2F38FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5981F7C-A805-4D14-AFB5-B1390A1006D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6D25EEF3-D5A9-4280-BCCA-AE95BCF53436", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D95D27C1-7D7F-4585-8116-E687D046FE41", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CB8B11FD-ABCF-4431-A48B-161191930104", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A51AF9A-1A30-4B53-959E-6C74C0AE8F41", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6657869-BAA3-4B0B-9192-13D1EA17CB14", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D18F510E-2047-4CF6-8E3A-082AF3BCEF76", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "45184D20-C855-4484-BE1A-D7BCFA09DF93", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "493EEAEA-7EB8-472C-8DD6-459D5C879A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CAE90FB3-04A2-41F9-B14A-B64AFF0ED685", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "036D3F44-5164-4321-A9F7-D6DBF828DE96", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BA6B5CF8-30AE-4308-B08E-0990EA4CC4A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "20391A5A-DA72-4BAE-A1D5-B8E8D0050E8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "AF252F0D-CE83-4EB9-BE77-2D9438D78B94", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "952748AE-C996-4B09-8C86-B27901F563AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "8FA1E622-26EF-4405-9665-64DE591850B1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access." }, { "lang": "es", "value": "rsyslog anterior a 7.6.6 y 8.x anterior a 8.4.1 y sysklogd 1.5 y anteriores permiten a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda), posiblemente ejecutar c\u00f3digo arbitrario o tener otro impacto no especificado a trav\u00e9s de un valor de prioridad (PRI) manipulado que provoca un acceso a array fuera de rango." } ], "id": "CVE-2014-3634", "lastModified": "2024-11-21T02:08:32.943", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-02T00:55:05.923", "references": [ { "source": "secalert@redhat.com", "url": "http://advisories.mageia.org/MGASA-2014-0411.html" }, { "source": "secalert@redhat.com", "url": "http://linux.oracle.com/errata/ELSA-2014-1654" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1397.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1654.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1671.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/61494" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/61720" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/61930" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2014/dsa-3040" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:130" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2014/09/30/15" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2014/10/03/1" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.rsyslog.com/remote-syslog-pri-vulnerability/" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2381-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://advisories.mageia.org/MGASA-2014-0411.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://linux.oracle.com/errata/ELSA-2014-1654" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1397.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1654.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1671.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61494" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61720" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-3040" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/09/30/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2014/10/03/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.rsyslog.com/remote-syslog-pri-vulnerability/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2381-1" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-06 00:15
Modified
2024-11-21 06:51
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message reception. It is best practice not to directly expose them to the public. When this practice is followed, the risk is considerably lower. Module `imdiag` is a diagnostics module primarily intended for testbench runs. We do not expect it to be present on any production installation. Octet-counted framing is not very common. Usually, it needs to be specifically enabled at senders. If users do not need it, they can turn it off for the most important modules. This will mitigate the vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rsyslog | rsyslog | * | |
fedoraproject | fedora | 35 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 | |
netapp | active_iq_unified_manager | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "matchCriteriaId": "44AF6D1B-803C-48AB-ABEC-541C3B9CD726", "versionEndExcluding": "8.2204.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message reception. It is best practice not to directly expose them to the public. When this practice is followed, the risk is considerably lower. Module `imdiag` is a diagnostics module primarily intended for testbench runs. We do not expect it to be present on any production installation. Octet-counted framing is not very common. Usually, it needs to be specifically enabled at senders. If users do not need it, they can turn it off for the most important modules. This will mitigate the vulnerability." }, { "lang": "es", "value": "Rsyslog es un sistema muy r\u00e1pido para el procesamiento de registros. Los m\u00f3dulos para la recepci\u00f3n de syslogs por TCP presentan un potencial desbordamiento del buffer de pila cuando es usado el framing de conteo de octetos. Esto puede resultar en un segfault o alg\u00fan otro mal funcionamiento. A nuestro entender, esta vulnerabilidad no puede ser usada para una ejecuci\u00f3n de c\u00f3digo remota. Pero todav\u00eda puede haber una peque\u00f1a posibilidad de que los expertos lo hagan. El fallo es producido cuando es le\u00eddo el recuento de octetos. Mientras se presenta una comprobaci\u00f3n del n\u00famero m\u00e1ximo de octetos, los d\u00edgitos son escritos en un b\u00fafer de mont\u00f3n incluso cuando el recuento de octetos supera el m\u00e1ximo, lo que puede usarse para sobrepasar el b\u00fafer de memoria. Sin embargo, una vez que la secuencia de d\u00edgitos es detenida, no pueden a\u00f1adirse m\u00e1s caracteres al b\u00fafer. En nuestra opini\u00f3n, esto hace que las explotaciones remotas sean imposibles o, al menos, muy complejos. El encuadre de octetos es uno de los dos modos de encuadre posibles. Es relativamente infrecuente, pero est\u00e1 habilitado por defecto en los receptores. Los m\u00f3dulos \"imtcp\", \"imptcp\", \"imgssapi\" y \"imhttp\" son usados para la recepci\u00f3n regular de mensajes syslog. Es una buena pr\u00e1ctica no exponerlos directamente al p\u00fablico. Cuando es seguida esta pr\u00e1ctica, el riesgo es considerablemente menor. El m\u00f3dulo \"imdiag\" es un m\u00f3dulo de diagn\u00f3stico destinado principalmente a las ejecuciones de los bancos de pruebas. No esperamos que est\u00e9 presente en ninguna instalaci\u00f3n de producci\u00f3n. El framing de octetos no es muy com\u00fan. Normalmente, es necesario habilitarlo espec\u00edficamente en los remitentes. Si los usuarios no lo necesitan, pueden deshabilitarlo para los m\u00f3dulos m\u00e1s importantes. Esto mitigar\u00e1 la vulnerabilidad" } ], "id": "CVE-2022-24903", "lastModified": "2024-11-21T06:51:21.620", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-06T00:15:07.873", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/commit/f211042ecbb472f9d8beb4678a65d272b6f07705" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00028.html" }, { "source": "security-advisories@github.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMNNXLCU2UORRVSZO24HL4KMVPK5PHVW/" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221111-0002/" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/commit/f211042ecbb472f9d8beb4678a65d272b6f07705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMNNXLCU2UORRVSZO24HL4KMVPK5PHVW/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221111-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5150" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-1284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-12-17 02:30
Modified
2024-11-21 00:54
Severity ?
Summary
imudp in rsyslog 4.x before 4.1.2, 3.21 before 3.21.9 beta, and 3.20 before 3.20.2 generates a message even when it is sent by an unauthorized sender, which allows remote attackers to cause a denial of service (disk consumption) via a large number of spurious messages.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "89BF4CB5-5DBF-4D3F-BB71-EAA44A433D9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "47275436-0B5A-4BC6-A3F6-2232BF8D36D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "841185A1-0CD7-4965-A40A-45836037B910", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4AB0A79C-E420-468E-9388-5E19EA54EA89", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "imudp in rsyslog 4.x before 4.1.2, 3.21 before 3.21.9 beta, and 3.20 before 3.20.2 generates a message even when it is sent by an unauthorized sender, which allows remote attackers to cause a denial of service (disk consumption) via a large number of spurious messages." }, { "lang": "es", "value": "imudp en rsyslog 4.x versiones anteriores a 4.1.2, 3.21 versiones anteriores a 3.21.9 beta, y 3.20 versiones anteriores a 3.20.2 genera un mensaje a\u00fan cuando es enviado por un remitente no autorizado, el cual permite a los atacantes remoto causar una denegaci\u00f3n de servicios (consumo de disco) a trav\u00e9s de un n\u00famero largo de mensajes falsos." } ], "id": "CVE-2008-5618", "lastModified": "2024-11-21T00:54:27.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-12-17T02:30:00.217", "references": [ { "source": "cve@mitre.org", "url": "http://www.rsyslog.com/Topic4.phtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.rsyslog.com/Topic4.phtml" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Not vulnerable. This issue did not affect the version of the rsyslog package, as shipped with Red Hat Enterprise Linux 5.", "lastModified": "2008-12-17T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-14 02:15
Modified
2024-11-21 01:26
Severity ?
Summary
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages were logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rsyslog | rsyslog | * | |
opensuse | opensuse | 11.4 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "matchCriteriaId": "22CBAD75-300B-4E25-B694-292C911A02E8", "versionEndExcluding": "5.7.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages were logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset." }, { "lang": "es", "value": "Se encontr\u00f3 una p\u00e9rdida de memoria en rsyslog versiones anteriores a la versi\u00f3n 5.7.6, en la manera en que son registrados los mensajes de log procesados ??en el demonio cuando m\u00faltiples conjuntos de reglas fueron usadas y algunos lotes de salida conten\u00edan mensajes que pertenec\u00edan a m\u00e1s de un conjunto de reglas. Un atacante local podr\u00eda causar una denegaci\u00f3n de servicio del demonio de rsyslogd mediante un mensaje de registro que pertenece a m\u00e1s de un conjunto de reglas." } ], "id": "CVE-2011-1489", "lastModified": "2024-11-21T01:26:25.820", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T02:15:10.797", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2011-1489" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1489" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1489" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2011-1489" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1489" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1489" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-772" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-02 00:55
Modified
2024-11-21 02:08
Severity ?
Summary
Integer overflow in rsyslog before 7.6.7 and 8.x before 8.4.2 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash) via a large priority (PRI) value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3634.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rsyslog | rsyslog | * | |
rsyslog | rsyslog | 8.1.0 | |
rsyslog | rsyslog | 8.1.1 | |
rsyslog | rsyslog | 8.1.2 | |
rsyslog | rsyslog | 8.1.3 | |
rsyslog | rsyslog | 8.1.4 | |
rsyslog | rsyslog | 8.1.5 | |
rsyslog | rsyslog | 8.1.6 | |
rsyslog | rsyslog | 8.2.0 | |
rsyslog | rsyslog | 8.2.1 | |
rsyslog | rsyslog | 8.2.2 | |
rsyslog | rsyslog | 8.2.3 | |
rsyslog | rsyslog | 8.3.0 | |
rsyslog | rsyslog | 8.3.1 | |
rsyslog | rsyslog | 8.3.2 | |
rsyslog | rsyslog | 8.3.3 | |
rsyslog | rsyslog | 8.3.4 | |
rsyslog | rsyslog | 8.3.5 | |
rsyslog | rsyslog | 8.4.0 | |
rsyslog | rsyslog | 8.4.1 | |
sysklogd_project | sysklogd | * | |
sysklogd_project | sysklogd | 1.1 | |
sysklogd_project | sysklogd | 1.2 | |
sysklogd_project | sysklogd | 1.3 | |
sysklogd_project | sysklogd | 1.4 | |
sysklogd_project | sysklogd | 1.4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "matchCriteriaId": "33475493-D5A0-4128-AE5D-336ED48A72DA", "versionEndIncluding": "7.6.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "36DC9B2C-6F7E-4EB4-9C0F-1A64F4D26988", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D3999B54-9597-435C-A1D3-63056A2F38FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5981F7C-A805-4D14-AFB5-B1390A1006D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6D25EEF3-D5A9-4280-BCCA-AE95BCF53436", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D95D27C1-7D7F-4585-8116-E687D046FE41", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "CB8B11FD-ABCF-4431-A48B-161191930104", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A51AF9A-1A30-4B53-959E-6C74C0AE8F41", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6657869-BAA3-4B0B-9192-13D1EA17CB14", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D18F510E-2047-4CF6-8E3A-082AF3BCEF76", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "45184D20-C855-4484-BE1A-D7BCFA09DF93", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "493EEAEA-7EB8-472C-8DD6-459D5C879A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CAE90FB3-04A2-41F9-B14A-B64AFF0ED685", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "036D3F44-5164-4321-A9F7-D6DBF828DE96", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BA6B5CF8-30AE-4308-B08E-0990EA4CC4A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "20391A5A-DA72-4BAE-A1D5-B8E8D0050E8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "AF252F0D-CE83-4EB9-BE77-2D9438D78B94", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "952748AE-C996-4B09-8C86-B27901F563AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "8FA1E622-26EF-4405-9665-64DE591850B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:8.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "97D654F0-9D45-47DB-B83A-B64601122C2A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysklogd_project:sysklogd:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8153176-4736-4C00-AEDA-B0C399CEF0FE", "versionEndIncluding": "1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sysklogd_project:sysklogd:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7134FB84-BF8E-4044-9DF1-FB006CAEB82D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sysklogd_project:sysklogd:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "7F8D4E4C-0BFB-4DA8-8A04-03F4BE1FBA6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sysklogd_project:sysklogd:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "4828D8F7-C422-453D-947F-2DA7FD7CE2FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sysklogd_project:sysklogd:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "34FBFC21-907B-44C7-92D7-7533CA869F1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sysklogd_project:sysklogd:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "CF0B6E60-34CB-4AEB-898C-92B89397D913", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in rsyslog before 7.6.7 and 8.x before 8.4.2 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash) via a large priority (PRI) value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3634." }, { "lang": "es", "value": "Desbordamiento de enteros en rsyslog anterior a 7.6.7 y 8.x anterior a 8.4.2 y sysklogd 1.5 y anteriores permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un valor de prioridad (PRI) grande. NOTA: esta vulnerabilidad existe debido a una soluci\u00f3n incompleta para CVE-2014-3634." } ], "id": "CVE-2014-3683", "lastModified": "2024-11-21T02:08:38.713", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-02T00:55:05.987", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/61494" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2014/dsa-3047" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2014/09/30/15" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2014/10/03/1" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.rsyslog.com/remote-syslog-pri-vulnerability-cve-2014-3683/" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2381-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61494" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-3047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/09/30/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2014/10/03/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.rsyslog.com/remote-syslog-pri-vulnerability-cve-2014-3683/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2381-1" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }