Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-5617

Опубликовано: 17 дек. 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 8.5

Описание

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

3.18.6-2
gutsy

DNE

hardy

ignored

end of life
intrepid

ignored

end of life, was needed
jaunty

not-affected

3.18.6-2
karmic

not-affected

3.18.6-2
lucid

not-affected

3.18.6-2
maverick

not-affected

3.18.6-2
natty

not-affected

3.18.6-2

Показывать по

EPSS

Процентиль: 59%
0.00389
Низкий

8.5 High

CVSS2

Связанные уязвимости

nvd
около 17 лет назад

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

debian
около 17 лет назад

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does no ...

github
больше 3 лет назад

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

EPSS

Процентиль: 59%
0.00389
Низкий

8.5 High

CVSS2