Lucene search

K
osvGoogleOSV:DSA-3047-1
HistoryOct 08, 2014 - 12:00 a.m.

rsyslog - security update

2014-10-0800:00:00
Google
osv.dev
12

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Mancha discovered a vulnerability in rsyslog, a system for log
processing. This vulnerability is an integer overflow that can be
triggered by malformed messages to a server, if this one accepts data
from untrusted sources, provoking message loss, denial of service and, potentially, remote code execution.

This vulnerability can be seen as an incomplete fix of CVE-2014-3634
(DSA 3040-1).

For more information: <http://www.rsyslog.com/remote-syslog-pri-vulnerability-cve-2014-3683/&gt;

For the stable distribution (wheezy), this problem has been fixed in
version 5.8.11-3+deb7u2.

For the testing distribution (jessie), this problem has been fixed in
version 8.4.2-1.

For the unstable distribution (sid), this problem has been fixed in
version 8.4.2-1.

We recommend that you upgrade your rsyslog packages.

CPENameOperatorVersion
rsyslogeq5.8.11-3+deb7u1
rsyslogeq5.8.11-3

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P