Lucene search

K
centosCentOS ProjectCESA-2014:1654
HistoryOct 20, 2014 - 6:15 p.m.

rsyslog7 security update

2014-10-2018:15:12
CentOS Project
lists.centos.org
38

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.228 Low

EPSS

Percentile

96.5%

CentOS Errata and Security Advisory CESA-2014:1654

The rsyslog7 packages provide an enhanced, multi-threaded syslog daemon
that supports writing to relational databases, syslog/TCP, RFC 3195,
permitted sender lists, filtering on any message part, and fine grained
output format control.

A flaw was found in the way rsyslog handled invalid log message priority
values. In certain configurations, a local attacker, or a remote attacker
able to connect to the rsyslog port, could use this flaw to crash the
rsyslog daemon or, potentially, execute arbitrary code as the user running
the rsyslog daemon. (CVE-2014-3634)

Red Hat would like to thank Rainer Gerhards of rsyslog upstream for
reporting this issue.

All rsyslog7 users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
update, the rsyslog service will be restarted automatically.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027748.html

Affected packages:
rsyslog7
rsyslog7-elasticsearch
rsyslog7-gnutls
rsyslog7-gssapi
rsyslog7-mysql
rsyslog7-pgsql
rsyslog7-relp
rsyslog7-snmp

Upstream details at:
https://access.redhat.com/errata/RHSA-2014:1654

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.228 Low

EPSS

Percentile

96.5%