CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
EPSS
Percentile
77.2%
There is a denial-of-service vulnerability in certain distributions of the Linux kernel logging daemon (klogd) which could allow an attacker to cause klogd to hang.
The Linux kernel logging daemon (klogd) can be forced to hang if it receives a null byte in a log message from the Linux kernel. Please see the following bug report for more information:
<http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=85478>
This vulnerability causes klogd to go into an infinite loop, thus preventing further kernel log messages from being written to disk.
Upgrade to latest version of klogd for your Linux distribution.
The following workaround is taken from http://bugs.debian.org/cgi-bin/bugreport.cgi?archive=no&bug=85478:
The patch below contains a possible fix for this, by treating a null byte as a delimiter, equivalent to \. Additionally, the patch prevents LogLine from being invoked with a negative counter as an argument.
diff -u sysklogd-1.3.orig/klogd.c sysklogd-1.3/klogd.c
-– sysklogd-1.3.orig/klogd.c\t\t Sat Feb 10 13:04:06 2001
+++ sysklogd-1.3/klogd.c\t\t Sat Feb 10 12:58:11 2001
@@ -707,7 +707,7 @@
\t\t break; /* full line_buff or end of input buffer */
}
- if( ptr == '' ) / newline */
+ if( *ptr == '' || ptr == ‘\0’) / newline or null terminator /
{
ptr++;\t\t / skip newline */
space -= 1;
@@ -877,8 +877,10 @@
\t\t fprintf(stderr, "klogd: Error return from sys_sycall: " \
\t\t \t\t "%d - %s", errno, strerror(errno));
}
-\t\t
-\t\t LogLine(log_buffer, rdcnt);
+ else
+ \t\t LogLine(log_buffer, rdcnt);
+
+
return;
}
@@ -902,8 +904,8 @@
\t\t Syslog(LOG_ERR, “Cannot read proc file system: %d - %s.”, \
\t\t errno, strerror(errno));
}
-\t\t
-\t\t LogLine(log_buffer, rdcnt);
+ else
+ \t\t \t\t LogLine(log_buffer, rdcnt);
return;
}
249579
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: February 10, 2001 Updated: July 20, 2001
Affected
Please see <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=85478>
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23249579 Feedback>).
Notified: February 10, 2001 Updated: July 20, 2001
Affected
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23249579 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was discovered by Thomas Roessler and was reported to the bugs.debian.org mailing list on February 10, 2001.
This document was written by Ian A. Finlay
CVE IDs: | CVE-2001-0738 |
---|---|
Severity Metric: | 1.83 Date Public: |