Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-3634

Опубликовано: 30 сент. 2014
Источник: redhat
CVSS2: 6.8
EPSS Средний

Описание

rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.

A flaw was found in the way rsyslog handled invalid log message priority values. In certain configurations, a local attacker, or a remote attacker able to connect to the rsyslog port, could use this flaw to crash the rsyslog daemon or, potentially in rsyslog 7.x, execute arbitrary code as the user running the rsyslog daemon.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5rsyslogWill not fix
Red Hat Enterprise Linux 5sysklogdWill not fix
Red Hat OpenShift Enterprise 2rsyslog7Affected
Red Hat Storage 2.1rsyslogWill not fix
Red Hat Enterprise Linux 5rsyslog5FixedRHSA-2014:167120.10.2014
Red Hat Enterprise Linux 6rsyslog7FixedRHSA-2014:165416.10.2014
Red Hat Enterprise Linux 6rsyslogFixedRHSA-2014:167120.10.2014
Red Hat Enterprise Linux 7rsyslogFixedRHSA-2014:139713.10.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-129->CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1142373rsyslog: remote syslog PRI vulnerability

EPSS

Процентиль: 97%
0.30554
Средний

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 11 лет назад

rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.

nvd
почти 11 лет назад

rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.

debian
почти 11 лет назад

rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier ...

github
больше 3 лет назад

rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.

oracle-oval
почти 11 лет назад

ELSA-2014-1671: rsyslog5 and rsyslog security update (MODERATE)

EPSS

Процентиль: 97%
0.30554
Средний

6.8 Medium

CVSS2