11 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in OSSEC 3.6.0. An uncontrolled recursion vulnerability in os_xml.c occurs when a large number of opening and closing XML tags is used. Because recursion is used in _ReadElem without restriction, an attacker can trigger a segmentation fault once unmapped memory is reached. Se detectó un problema en OSSEC versión 3.6.0. Se presenta una vulnerabilidad de recursividad no controlada en el archivo os_xml.c cuando es usada una gran cantidad de etiquetas XML de apertura y cierre. • https://github.com/ossec/ossec-hids/issues/1953 • CWE-674: Uncontrolled Recursion •

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 1

In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a heap-based buffer overflow in the rootcheck decoder component via an authenticated client. En OSSEC-HIDS versiones 2.7 hasta 3.5.0, el componente del servidor responsable del análisis de registro (ossec-analysisd) es vulnerable a un desbordamiento del búfer en la región heap de la memoria en el componente rootcheck decoder por medio de un cliente autenticado. • https://github.com/ossec/ossec-hids/issues/1820 https://github.com/ossec/ossec-hids/issues/1821 https://security.gentoo.org/glsa/202007-33 https://www.ossec.net • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 14%CPEs: 1EXPL: 1

In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to an off-by-one heap-based buffer overflow during the cleaning of crafted syslog msgs (received from authenticated remote agents and delivered to the analysisd processing queue by ossec-remoted). En OSSEC-HIDS versiones 2.7 hasta 3.5.0, el componente del servidor responsable del análisis de registro (ossec-analysisd) es vulnerable a un desbordamiento de búfer en la región heap de la memoria por un paso durante la limpieza de los mensajes syslog diseñados (recibidos desde agentes remotos autenticados y entregados a la cola de procesamiento de analysisd por ossec-remoted). • https://github.com/ossec/ossec-hids/issues/1816 https://github.com/ossec/ossec-hids/issues/1821 https://security.gentoo.org/glsa/202007-33 https://www.ossec.net • CWE-193: Off-by-one Error CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a use-after-free during processing of ossec-alert formatted msgs (received from authenticated remote agents and delivered to the analysisd processing queue by ossec-remoted). En OSSEC-HIDS versiones 2.7 hasta 3.5.0, el componente del servidor responsable del análisis de registro (ossec-analysisd) es vulnerable a un uso de la memoria previamente liberada durante el procesamiento de mensajes con formato ossec-alert (recibidos desde agentes remotos autenticados y entregados a la cola de procesamiento de analysisd por ossec-remoted). • https://github.com/ossec/ossec-hids/issues/1817 https://github.com/ossec/ossec-hids/issues/1821 https://security.gentoo.org/glsa/202007-33 https://www.ossec.net • CWE-416: Use After Free •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

In OSSEC-HIDS 2.7 through 3.5.0, the OS_CleanMSG function in ossec-analysisd doesn't remove or encode terminal control characters or newlines from processed log messages. In many cases, those characters are later logged. Because newlines (\n) are permitted in messages processed by ossec-analysisd, it may be possible to inject nested events into the ossec log. Use of terminal control characters may allow obfuscating events or executing commands when viewed through vulnerable terminal emulators. This may be an unauthenticated remote attack for certain types and origins of logged data. • https://github.com/ossec/ossec-hids/issues/1814 https://github.com/ossec/ossec-hids/issues/1821 https://security.gentoo.org/glsa/202007-33 https://www.ossec.net • CWE-20: Improper Input Validation •