Lucene search

K
cve[email protected]CVE-2008-5617
HistoryDec 17, 2008 - 2:30 a.m.

CVE-2008-5617

2008-12-1702:30:00
CWE-264
web.nvd.nist.gov
21
acl
rsyslog
access restrictions
spoof
cve-2008-5617

6.3 Medium

AI Score

Confidence

Low

8.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:P/A:C

0.013 Low

EPSS

Percentile

85.8%

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

6.3 Medium

AI Score

Confidence

Low

8.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:P/A:C

0.013 Low

EPSS

Percentile

85.8%