Lucene search

K
nvd[email protected]NVD:CVE-2011-4623
HistorySep 25, 2012 - 11:55 p.m.

CVE-2011-4623

2012-09-2523:55:01
CWE-189
web.nvd.nist.gov
2

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

6.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.

Affected configurations

NVD
Node
rsyslogrsyslogMatch4.1.0
OR
rsyslogrsyslogMatch4.1.1
OR
rsyslogrsyslogMatch4.1.2
OR
rsyslogrsyslogMatch4.1.3
OR
rsyslogrsyslogMatch4.1.4
OR
rsyslogrsyslogMatch4.1.5
OR
rsyslogrsyslogMatch4.1.6
OR
rsyslogrsyslogMatch4.1.7
OR
rsyslogrsyslogMatch4.2.0
OR
rsyslogrsyslogMatch4.3.0
OR
rsyslogrsyslogMatch4.3.1
OR
rsyslogrsyslogMatch4.3.2
OR
rsyslogrsyslogMatch4.4.0
OR
rsyslogrsyslogMatch4.4.1
OR
rsyslogrsyslogMatch4.4.2
OR
rsyslogrsyslogMatch4.5.0
OR
rsyslogrsyslogMatch4.5.1
OR
rsyslogrsyslogMatch4.5.2
OR
rsyslogrsyslogMatch4.5.3
OR
rsyslogrsyslogMatch4.5.4
OR
rsyslogrsyslogMatch4.5.5
OR
rsyslogrsyslogMatch4.5.6
OR
rsyslogrsyslogMatch4.5.7
OR
rsyslogrsyslogMatch4.5.8
OR
rsyslogrsyslogMatch4.6.0
OR
rsyslogrsyslogMatch4.6.1
OR
rsyslogrsyslogMatch4.6.2
OR
rsyslogrsyslogMatch4.6.3
OR
rsyslogrsyslogMatch4.6.4
OR
rsyslogrsyslogMatch4.6.5
Node
rsyslogrsyslogMatch5.1.0
OR
rsyslogrsyslogMatch5.1.1
OR
rsyslogrsyslogMatch5.1.2
OR
rsyslogrsyslogMatch5.1.3
OR
rsyslogrsyslogMatch5.1.4
OR
rsyslogrsyslogMatch5.1.5
OR
rsyslogrsyslogMatch5.1.6
OR
rsyslogrsyslogMatch5.2.0
OR
rsyslogrsyslogMatch5.2.1
OR
rsyslogrsyslogMatch5.2.2
OR
rsyslogrsyslogMatch5.3.1
OR
rsyslogrsyslogMatch5.3.2
OR
rsyslogrsyslogMatch5.3.3
OR
rsyslogrsyslogMatch5.3.4
OR
rsyslogrsyslogMatch5.3.5
OR
rsyslogrsyslogMatch5.3.6
OR
rsyslogrsyslogMatch5.3.7
OR
rsyslogrsyslogMatch5.4.0
OR
rsyslogrsyslogMatch5.4.1
OR
rsyslogrsyslogMatch5.4.2
OR
rsyslogrsyslogMatch5.5.0
OR
rsyslogrsyslogMatch5.5.1
OR
rsyslogrsyslogMatch5.5.2
OR
rsyslogrsyslogMatch5.5.3
OR
rsyslogrsyslogMatch5.5.4
OR
rsyslogrsyslogMatch5.5.5
OR
rsyslogrsyslogMatch5.5.6
OR
rsyslogrsyslogMatch5.5.7
OR
rsyslogrsyslogMatch5.6.0
OR
rsyslogrsyslogMatch5.6.1
OR
rsyslogrsyslogMatch5.6.2
OR
rsyslogrsyslogMatch5.6.3
OR
rsyslogrsyslogMatch5.6.4
OR
rsyslogrsyslogMatch5.6.5
OR
rsyslogrsyslogMatch5.7.0
OR
rsyslogrsyslogMatch5.7.1
OR
rsyslogrsyslogMatch5.7.2
OR
rsyslogrsyslogMatch5.7.3
Node
rsyslogrsyslogMatch6.1.0
OR
rsyslogrsyslogMatch6.1.1
OR
rsyslogrsyslogMatch6.1.2
OR
rsyslogrsyslogMatch6.1.3

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

6.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%