7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.39 Low
EPSS
Percentile
97.3%
rsyslog librelp version 1.2.14 and earlier contains a Buffer Overflow
vulnerability in the checking of x509 certificates from a peer that can
result in Remote code execution. This attack appear to be exploitable a
remote attacker that can connect to rsyslog and trigger a stack buffer
overflow by sending a specially crafted x509 certificate.
Author | Note |
---|---|
mdeslaur | only used by rsyslog-relp packages in trusty, which is in universe. |
github.com/rsyslog/librelp/blob/532aa362f0f7a8d037505b0a27a1df452f9bac9e/src/tcp.c#L1205
launchpad.net/bugs/cve/CVE-2018-1000140
lgtm.com/rules/1505913226124/
nvd.nist.gov/vuln/detail/CVE-2018-1000140
security-tracker.debian.org/tracker/CVE-2018-1000140
ubuntu.com/security/notices/USN-3612-1
ubuntu.com/security/notices/USN-4828-1
www.cve.org/CVERecord?id=CVE-2018-1000140
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.39 Low
EPSS
Percentile
97.3%