Lucene search

K
certCERTVU:249579
HistoryJul 24, 2001 - 12:00 a.m.

klogd does not adequately handle NULL byte when parsing text using LogLine( )

2001-07-2400:00:00
www.kb.cert.org
16

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.005

Percentile

77.2%

Overview

There is a denial-of-service vulnerability in certain distributions of the Linux kernel logging daemon (klogd) which could allow an attacker to cause klogd to hang.

Description

The Linux kernel logging daemon (klogd) can be forced to hang if it receives a null byte in a log message from the Linux kernel. Please see the following bug report for more information:

<http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=85478&gt;


Impact

This vulnerability causes klogd to go into an infinite loop, thus preventing further kernel log messages from being written to disk.


Solution

Upgrade to latest version of klogd for your Linux distribution.


The following workaround is taken from http://bugs.debian.org/cgi-bin/bugreport.cgi?archive=no&bug=85478:
The patch below contains a possible fix for this, by treating a null byte as a delimiter, equivalent to \. Additionally, the patch prevents LogLine from being invoked with a negative counter as an argument.

diff -u sysklogd-1.3.orig/klogd.c sysklogd-1.3/klogd.c
-– sysklogd-1.3.orig/klogd.c\t\t Sat Feb 10 13:04:06 2001
+++ sysklogd-1.3/klogd.c\t\t Sat Feb 10 12:58:11 2001
@@ -707,7 +707,7 @@
\t\t break; /* full line_buff or end of input buffer */
}

- if( ptr == '' ) / newline */
+ if( *ptr == '' || ptr == ‘\0’) / newline or null terminator /
{
ptr++;\t\t /
skip newline */
space -= 1;
@@ -877,8 +877,10 @@
\t\t fprintf(stderr, "klogd: Error return from sys_sycall: " \
\t\t \t\t "%d - %s", errno, strerror(errno));
}
-\t\t
-\t\t LogLine(log_buffer, rdcnt);
+ else
+ \t\t LogLine(log_buffer, rdcnt);
+
+
return;
}

@@ -902,8 +904,8 @@
\t\t Syslog(LOG_ERR, “Cannot read proc file system: %d - %s.”, \
\t\t errno, strerror(errno));
}
-\t\t
-\t\t LogLine(log_buffer, rdcnt);
+ else
+ \t\t \t\t LogLine(log_buffer, rdcnt);

return;
}


Vendor Information

249579

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Debian __ Affected

Notified: February 10, 2001 Updated: July 20, 2001

Status

Affected

Vendor Statement

Please see <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=85478&gt;

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23249579 Feedback>).

Immunix __ Affected

Notified: February 10, 2001 Updated: July 20, 2001

Status

Affected

Vendor Statement

Please see <http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-026-01&gt;[](&lt;http://bugs.debian.org/cgi-bin/bugreport.cgi?archive=no&bug=85478&gt;)

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23249579 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was discovered by Thomas Roessler and was reported to the bugs.debian.org mailing list on February 10, 2001.

This document was written by Ian A. Finlay

Other Information

CVE IDs: CVE-2001-0738
Severity Metric: 1.83 Date Public:

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.005

Percentile

77.2%

Related for VU:249579