CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
96.5%
Integer overflow in rsyslog before 7.6.7 and 8.x before 8.4.2 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash) via a large priority (PRI) value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3634.
Vendor | Product | Version | CPE |
---|---|---|---|
rsyslog | rsyslog | * | cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:* |
rsyslog | rsyslog | 8.1.0 | cpe:2.3:a:rsyslog:rsyslog:8.1.0:*:*:*:*:*:*:* |
rsyslog | rsyslog | 8.1.1 | cpe:2.3:a:rsyslog:rsyslog:8.1.1:*:*:*:*:*:*:* |
rsyslog | rsyslog | 8.1.2 | cpe:2.3:a:rsyslog:rsyslog:8.1.2:*:*:*:*:*:*:* |
rsyslog | rsyslog | 8.1.3 | cpe:2.3:a:rsyslog:rsyslog:8.1.3:*:*:*:*:*:*:* |
rsyslog | rsyslog | 8.1.4 | cpe:2.3:a:rsyslog:rsyslog:8.1.4:*:*:*:*:*:*:* |
rsyslog | rsyslog | 8.1.5 | cpe:2.3:a:rsyslog:rsyslog:8.1.5:*:*:*:*:*:*:* |
rsyslog | rsyslog | 8.1.6 | cpe:2.3:a:rsyslog:rsyslog:8.1.6:*:*:*:*:*:*:* |
rsyslog | rsyslog | 8.2.0 | cpe:2.3:a:rsyslog:rsyslog:8.2.0:*:*:*:*:*:*:* |
rsyslog | rsyslog | 8.2.1 | cpe:2.3:a:rsyslog:rsyslog:8.2.1:*:*:*:*:*:*:* |
lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html
lists.opensuse.org/opensuse-updates/2014-10/msg00020.html
lists.opensuse.org/opensuse-updates/2014-10/msg00021.html
secunia.com/advisories/61494
www.debian.org/security/2014/dsa-3047
www.openwall.com/lists/oss-security/2014/09/30/15
www.openwall.com/lists/oss-security/2014/10/03/1
www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
www.rsyslog.com/remote-syslog-pri-vulnerability-cve-2014-3683/
www.ubuntu.com/usn/USN-2381-1