Lucene search

K
f5F5F5:K42903299
HistoryJul 06, 2017 - 12:00 a.m.

K42903299 : rsyslog: remote syslog PRI vulnerability CVE-2014-3634

2017-07-0600:00:00
my.f5.com
64

8.3 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.227 Low

EPSS

Percentile

96.1%

Security Advisory Description

rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access. (CVE-2014-3634)
Impact
In certain configurations, a local attacker or a remote attacker that can connect to the rsyslogport could use this flaw to make the rsyslogdaemon no longer respond or, potentially in rsyslog 7.x, run arbitrary code as the user that is running the rsyslogdaemon.

8.3 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.227 Low

EPSS

Percentile

96.1%