rsyslog is vulnerable to denial of service (DoS) attacks. The vulnerability exists due to an integer overflow issue in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.
bugzilla.adiscon.com/show_bug.cgi?id=221
git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=6bad782f154b7f838c7371bf99c13f6dc4ec4101
git.adiscon.com/?p=rsyslog.git;a=commit;h=6bad782f154b7f838c7371bf99c13f6dc4ec4101
rsyslog.com/changelog-for-4-6-6-v4-stable/
rsyslog.com/changelog-for-5-7-4-v5-beta/
rsyslog.com/changelog-for-6-1-4-devel/
secunia.com/advisories/45848
secunia.com/advisories/47698
www.openwall.com/lists/oss-security/2011/12/22/2
www.securityfocus.com/bid/51171
www.securitytracker.com/id?1026556
www.ubuntu.com/usn/USN-1338-1
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=740420
bugzilla.redhat.com/show_bug.cgi?id=769822
bugzilla.redhat.com/show_bug.cgi?id=803550
bugzilla.redhat.com/show_bug.cgi?id=813079
bugzilla.redhat.com/show_bug.cgi?id=813084
bugzilla.redhat.com/show_bug.cgi?id=820311
bugzilla.redhat.com/show_bug.cgi?id=820996
rhn.redhat.com/errata/RHSA-2012-0796.html