2 results (0.004 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

07 Mar 2024 — Heap based buffer flow in zlog v1.1.0 to v1.2.17 in zlog_rule_new().The size of record_name is MAXLEN_PATH(1024) + 1 but file_path may have data upto MAXLEN_CFG_LINE(MAXLEN_PATH*4) + 1. So a check was missing in zlog_rule_new() while copying the record_name from file_path + 1 which caused the buffer overflow. An attacker can exploit this vulnerability to overwrite the zlog_record_fn record_func function pointer to get arbitrary code execution or potentially cause remote code execution (RCE). zlog 1.2.16 tie... • https://github.com/HardySimpson/zlog • CWE-122: Heap-based Buffer Overflow •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

08 Apr 2022 — A Buffer Overflow vulnerability exists in zlog 1.2.15 via zlog_conf_build_with_file in src/zlog/src/conf.c. Se presenta una vulnerabilidad de desbordamiento del búfer en zlog versión 1.2.15, por medio de la función zlog_conf_build_with_file en el archivo src/zlog/src/conf.c • https://github.com/HardySimpson/zlog • CWE-787: Out-of-bounds Write •