Количество 16
Количество 16

BDU:2022-04363
Уязвимость TCP-модулей программной утилиты для обработки логов Rsyslog, позволяющая нарушителю выполнить произвольный код

ROS-20240403-16
Уязвимость rsyslog

CVE-2022-24903
Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message receptio...

CVE-2022-24903
Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message receptio...

CVE-2022-24903
Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message reception.

CVE-2022-24903
CVE-2022-24903
Rsyslog is a rocket-fast system for log processing. Modules for TCP sy ...

SUSE-SU-2022:2333-1
Security update for rsyslog

SUSE-SU-2022:2331-1
Security update for rsyslog

SUSE-SU-2022:2314-1
Security update for rsyslog

SUSE-SU-2022:1817-1
Security update for rsyslog

SUSE-SU-2022:1583-1
Security update for rsyslog
ELSA-2022-9783
ELSA-2022-9783: rsyslog rsyslog7 security update (IMPORTANT)
ELSA-2022-4803
ELSA-2022-4803: rsyslog security update (IMPORTANT)
ELSA-2022-4799
ELSA-2022-4799: rsyslog security update (IMPORTANT)
ELSA-2022-4795
ELSA-2022-4795: rsyslog security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2022-04363 Уязвимость TCP-модулей программной утилиты для обработки логов Rsyslog, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.1 | 1% Низкий | больше 3 лет назад |
![]() | ROS-20240403-16 Уязвимость rsyslog | CVSS3: 8.1 | 1% Низкий | больше 1 года назад |
![]() | CVE-2022-24903 Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message receptio... | CVSS3: 8.1 | 1% Низкий | больше 3 лет назад |
![]() | CVE-2022-24903 Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message receptio... | CVSS3: 8.1 | 1% Низкий | больше 3 лет назад |
![]() | CVE-2022-24903 Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message reception. | CVSS3: 8.1 | 1% Низкий | больше 3 лет назад |
![]() | CVSS3: 8.1 | 1% Низкий | больше 3 лет назад | |
CVE-2022-24903 Rsyslog is a rocket-fast system for log processing. Modules for TCP sy ... | CVSS3: 8.1 | 1% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2022:2333-1 Security update for rsyslog | 1% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:2331-1 Security update for rsyslog | 1% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:2314-1 Security update for rsyslog | 1% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:1817-1 Security update for rsyslog | 1% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2022:1583-1 Security update for rsyslog | 1% Низкий | больше 3 лет назад | |
ELSA-2022-9783 ELSA-2022-9783: rsyslog rsyslog7 security update (IMPORTANT) | около 3 лет назад | |||
ELSA-2022-4803 ELSA-2022-4803: rsyslog security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-4799 ELSA-2022-4799: rsyslog security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-4795 ELSA-2022-4795: rsyslog security update (IMPORTANT) | около 3 лет назад |
Уязвимостей на страницу