Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-56wq-xcxw-c4q3

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.

Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.

EPSS

Процентиль: 98%
0.62007
Средний

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 14 лет назад

Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.

redhat
почти 14 лет назад

Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.

nvd
почти 14 лет назад

Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.

debian
почти 14 лет назад

Stack-based buffer overflow in the parseLegacySyslogMsg function in to ...

oracle-oval
почти 14 лет назад

ELSA-2011-1247: rsyslog security update (MODERATE)

EPSS

Процентиль: 98%
0.62007
Средний

Дефекты

CWE-119