CVE-2014-3683
https://notcve.org/view.php?id=CVE-2014-3683
Integer overflow in rsyslog before 7.6.7 and 8.x before 8.4.2 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash) via a large priority (PRI) value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3634. Desbordamiento de enteros en rsyslog anterior a 7.6.7 y 8.x anterior a 8.4.2 y sysklogd 1.5 y anteriores permite a atacantes remotos causar una denegación de servicio (caída) a través de un valor de prioridad (PRI) grande. NOTA: esta vulnerabilidad existe debido a una solución incompleta para CVE-2014-3634. • http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html http://secunia.com/advisories/61494 http://www.debian.org/security/2014/dsa-3047 http://www.openwall.com/lists/oss-security/2014/09/30/15 http://www.openwall.com/lists/oss-security/2014/10/03/1 http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html http: • CWE-189: Numeric Errors •
CVE-2014-3634 – rsyslog: remote syslog PRI vulnerability
https://notcve.org/view.php?id=CVE-2014-3634
rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access. rsyslog anterior a 7.6.6 y 8.x anterior a 8.4.1 y sysklogd 1.5 y anteriores permiten a atacantes remotos causar una denegación de servicio (caída), posiblemente ejecutar código arbitrario o tener otro impacto no especificado a través de un valor de prioridad (PRI) manipulado que provoca un acceso a array fuera de rango. A flaw was found in the way rsyslog handled invalid log message priority values. In certain configurations, a local attacker, or a remote attacker able to connect to the rsyslog port, could use this flaw to crash the rsyslog daemon or, potentially in rsyslog 7.x, execute arbitrary code as the user running the rsyslog daemon. • http://advisories.mageia.org/MGASA-2014-0411.html http://linux.oracle.com/errata/ELSA-2014-1654 http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html http://rhn.redhat.com/errata/RHSA-2014-1397.html http://rhn.redhat.com/errata/RHSA-2014-1654.html http://rhn.redhat.com/errata/RHSA-2014-1671.html http://secunia.com/advisories/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •