Page 2 of 7 results (0.006 seconds)

CVSS: 7.5EPSS: 7%CPEs: 8EXPL: 2

Balabit Syslog-NG 1.4.x before 1.4.15, and 1.5.x before 1.5.20, when using template filenames or output, does not properly track the size of a buffer when constant characters are encountered during macro expansion, which allows remote attackers to cause a denial of service and possibly execute arbitrary code. Balabit Syslog-NG 1.4.x antes de 1.4.15, y 1.4.x antes de 1.5.20, cuando se usan plantillas de nombres de fichero o de salida, no controla adecuadamente el tamaño de un búfer cuando se encuentran caracteres constantes durante una expansión de macro, lo que permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000547 http://marc.info/?l=bugtraq&m=103426595021928&w=2 http://www.balabit.hu/static/zsa/ZSA-2002-014-en.txt http://www.debian.org/security/2002/dsa-175 http://www.iss.net/security_center/static/10339.php http://www.linuxsecurity.com/advisories/other_advisory-2513.html http://www.novell.com/linux/security/advisories/2002_039_syslog_ng.html http://www.securityfocus.com/bid/5934 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 1

Balabit syslog-ng allows remote attackers to cause a denial of service (application crash) via a malformed log message that does not have a closing > in the priority specifier. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:02.syslog-ng.asc http://archives.neohapsis.com/archives/bugtraq/2000-11/0300.html http://www.balabit.hu/products/syslog-ng http://www.securityfocus.com/bid/1981 https://exchange.xforce.ibmcloud.com/vulnerabilities/5576 •