Описание
rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
A flaw was found in the way rsyslog handled invalid log message priority values. In certain configurations, a local attacker, or a remote attacker able to connect to the rsyslog port, could use this flaw to crash the rsyslog daemon or, potentially in rsyslog 7.x, execute arbitrary code as the user running the rsyslog daemon.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | rsyslog | Will not fix | ||
Red Hat Enterprise Linux 5 | sysklogd | Will not fix | ||
Red Hat OpenShift Enterprise 2 | rsyslog7 | Affected | ||
Red Hat Storage 2.1 | rsyslog | Will not fix | ||
Red Hat Enterprise Linux 5 | rsyslog5 | Fixed | RHSA-2014:1671 | 20.10.2014 |
Red Hat Enterprise Linux 6 | rsyslog7 | Fixed | RHSA-2014:1654 | 16.10.2014 |
Red Hat Enterprise Linux 6 | rsyslog | Fixed | RHSA-2014:1671 | 20.10.2014 |
Red Hat Enterprise Linux 7 | rsyslog | Fixed | RHSA-2014:1397 | 13.10.2014 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.8 Medium
CVSS2
Связанные уязвимости
rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier ...
rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
ELSA-2014-1671: rsyslog5 and rsyslog security update (MODERATE)
EPSS
6.8 Medium
CVSS2