Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2011-4623

Опубликовано: 25 сент. 2012
Источник: nvd
CVSS2: 2.1
EPSS Низкий

Описание

Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.1.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.1.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.1.6:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.1.7:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.4.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.4.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.5.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.5.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.5.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.5.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.5.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.5.6:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.5.7:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.5.8:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.5:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:rsyslog:rsyslog:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.1.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.1.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.1.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.1.6:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.2.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.6:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.7:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.4.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.4.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.4.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.6:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.7:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.6.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.6.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.6.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.6.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.6.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.6.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.3:*:*:*:*:*:*:*
Конфигурация 3

Одно из

cpe:2.3:a:rsyslog:rsyslog:6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:6.1.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:6.1.3:*:*:*:*:*:*:*

EPSS

Процентиль: 27%
0.0009
Низкий

2.1 Low

CVSS2

Дефекты

CWE-189

Связанные уязвимости

ubuntu
почти 13 лет назад

Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.

redhat
больше 14 лет назад

Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.

debian
почти 13 лет назад

Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf. ...

github
больше 3 лет назад

Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.

oracle-oval
около 13 лет назад

ELSA-2012-0796: rsyslog security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 27%
0.0009
Низкий

2.1 Low

CVSS2

Дефекты

CWE-189