Page 2 of 11 results (0.012 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The zmq3 input and output modules in rsyslog before 8.28.0 interpreted description fields as format strings, possibly allowing a format string attack with unspecified impact. Los módulos de entrada y salida de zmq3 en versiones de rsyslog anteriores a 8.28.0 interpretaban campos de descripción como cadenas de formato, lo que podía dar lugar a un ataque de tipo “format string” y causar un impacto no especificado. • https://github.com/rsyslog/rsyslog/blob/master/ChangeLog https://github.com/rsyslog/rsyslog/commit/062d0c671a29f7c6f7dff4a2f1f35df375bbb30b https://github.com/rsyslog/rsyslog/pull/1565 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 5.0EPSS: 11%CPEs: 26EXPL: 1

Integer overflow in rsyslog before 7.6.7 and 8.x before 8.4.2 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash) via a large priority (PRI) value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3634. Desbordamiento de enteros en rsyslog anterior a 7.6.7 y 8.x anterior a 8.4.2 y sysklogd 1.5 y anteriores permite a atacantes remotos causar una denegación de servicio (caída) a través de un valor de prioridad (PRI) grande. NOTA: esta vulnerabilidad existe debido a una solución incompleta para CVE-2014-3634. • http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html http://secunia.com/advisories/61494 http://www.debian.org/security/2014/dsa-3047 http://www.openwall.com/lists/oss-security/2014/09/30/15 http://www.openwall.com/lists/oss-security/2014/10/03/1 http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html http: • CWE-189: Numeric Errors •

CVSS: 7.5EPSS: 24%CPEs: 25EXPL: 1

rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access. rsyslog anterior a 7.6.6 y 8.x anterior a 8.4.1 y sysklogd 1.5 y anteriores permiten a atacantes remotos causar una denegación de servicio (caída), posiblemente ejecutar código arbitrario o tener otro impacto no especificado a través de un valor de prioridad (PRI) manipulado que provoca un acceso a array fuera de rango. A flaw was found in the way rsyslog handled invalid log message priority values. In certain configurations, a local attacker, or a remote attacker able to connect to the rsyslog port, could use this flaw to crash the rsyslog daemon or, potentially in rsyslog 7.x, execute arbitrary code as the user running the rsyslog daemon. • http://advisories.mageia.org/MGASA-2014-0411.html http://linux.oracle.com/errata/ELSA-2014-1654 http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html http://rhn.redhat.com/errata/RHSA-2014-1397.html http://rhn.redhat.com/errata/RHSA-2014-1654.html http://rhn.redhat.com/errata/RHSA-2014-1671.html http://secunia.com/advisories/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 6%CPEs: 42EXPL: 0

Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response. Vulnerabilidad de doble liberación en la función writeDataError en el plugin Elasticsearch (omelasticsearch) en rsyslog anterior a 7.4.2 y anterior a 7.5.2 devel, cuando un errorfile se establece en el registro de log local, permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de una respuesta JSON diseñada. • http://www.openwall.com/lists/oss-security/2013/07/05/2 http://www.rsyslog.com/rsyslog-7-4-2-v7-stable-released http://www.rsyslog.com/rsyslog-7-5-2-v7-devel-released • CWE-399: Resource Management Errors •

CVSS: 5.4EPSS: 0%CPEs: 72EXPL: 0

Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow. Desbordamiento de entero en la función rsCStrExtendBuf en runtime/stringbuf.c en el módulo imfile en rsyslog v4.x anteriores v4.6.6, v5.x anteriores a v5.7.4, y v6.x anteriores a v6.1.4, permite a atacantes remotos provocar una denegación de servicio (cuelgue del demonio) a través de un fichero grande, que provoca un desbordamiento de búfer basado en memoria dinámica. • http://bugzilla.adiscon.com/show_bug.cgi?id=221 http://git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=6bad782f154b7f838c7371bf99c13f6dc4ec4101 http://rsyslog.com/changelog-for-4-6-6-v4-stable http://rsyslog.com/changelog-for-5-7-4-v5-beta http://rsyslog.com/changelog-for-6-1-4-devel http://secunia.com/advisories/45848 http://secunia.com/advisories/47698 http://www.openwall.com/lists/oss-security/2011/12/22/2 http://www.securityfocus.com/bid/51171 http://www.securi • CWE-189: Numeric Errors •