Количество 16
Количество 16

CVE-2022-24903
Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message receptio...

CVE-2022-24903
Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message receptio...

CVE-2022-24903
Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message reception.

CVE-2022-24903
CVE-2022-24903
Rsyslog is a rocket-fast system for log processing. Modules for TCP sy ...

SUSE-SU-2022:2333-1
Security update for rsyslog

SUSE-SU-2022:2331-1
Security update for rsyslog

SUSE-SU-2022:2314-1
Security update for rsyslog

SUSE-SU-2022:1817-1
Security update for rsyslog

SUSE-SU-2022:1583-1
Security update for rsyslog
ELSA-2022-9783
ELSA-2022-9783: rsyslog rsyslog7 security update (IMPORTANT)
ELSA-2022-4803
ELSA-2022-4803: rsyslog security update (IMPORTANT)
ELSA-2022-4799
ELSA-2022-4799: rsyslog security update (IMPORTANT)
ELSA-2022-4795
ELSA-2022-4795: rsyslog security update (IMPORTANT)

BDU:2022-04363
Уязвимость TCP-модулей программной утилиты для обработки логов Rsyslog, позволяющая нарушителю выполнить произвольный код

ROS-20240403-16
Уязвимость rsyslog
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2022-24903 Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message receptio... | CVSS3: 8.1 | 1% Низкий | около 3 лет назад |
![]() | CVE-2022-24903 Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message receptio... | CVSS3: 8.1 | 1% Низкий | около 3 лет назад |
![]() | CVE-2022-24903 Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message reception. | CVSS3: 8.1 | 1% Низкий | около 3 лет назад |
![]() | CVSS3: 8.1 | 1% Низкий | около 3 лет назад | |
CVE-2022-24903 Rsyslog is a rocket-fast system for log processing. Modules for TCP sy ... | CVSS3: 8.1 | 1% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:2333-1 Security update for rsyslog | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:2331-1 Security update for rsyslog | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:2314-1 Security update for rsyslog | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:1817-1 Security update for rsyslog | 1% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:1583-1 Security update for rsyslog | 1% Низкий | около 3 лет назад | |
ELSA-2022-9783 ELSA-2022-9783: rsyslog rsyslog7 security update (IMPORTANT) | почти 3 года назад | |||
ELSA-2022-4803 ELSA-2022-4803: rsyslog security update (IMPORTANT) | около 3 лет назад | |||
ELSA-2022-4799 ELSA-2022-4799: rsyslog security update (IMPORTANT) | около 3 лет назад | |||
ELSA-2022-4795 ELSA-2022-4795: rsyslog security update (IMPORTANT) | почти 3 года назад | |||
![]() | BDU:2022-04363 Уязвимость TCP-модулей программной утилиты для обработки логов Rsyslog, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.1 | 1% Низкий | около 3 лет назад |
![]() | ROS-20240403-16 Уязвимость rsyslog | CVSS3: 8.1 | 1% Низкий | около 1 года назад |
Уязвимостей на страницу