Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8fh8-56w4-443q

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

EPSS

Процентиль: 59%
0.00389
Низкий

Связанные уязвимости

ubuntu
около 17 лет назад

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

nvd
около 17 лет назад

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

debian
около 17 лет назад

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does no ...

EPSS

Процентиль: 59%
0.00389
Низкий