CVE-2011-4623
rsyslog: DoS due integer signedness error while extending rsyslog counted string buffer
Severity Score
Exploit Likelihood
Affected Versions
72Public Exploits
0Exploited in Wild
-Decision
Descriptions
Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.
Desbordamiento de entero en la función rsCStrExtendBuf en runtime/stringbuf.c en el módulo imfile en rsyslog v4.x anteriores v4.6.6, v5.x anteriores a v5.7.4, y v6.x anteriores a v6.1.4, permite a atacantes remotos provocar una denegación de servicio (cuelgue del demonio) a través de un fichero grande, que provoca un desbordamiento de búfer basado en memoria dinámica.
Multiple vulnerabilities have been found in RSYSLOG, allowing attackers to cause Denial of Service. Versions less than 8.4.2 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-11-29 CVE Reserved
- 2012-09-25 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-189: Numeric Errors
CAPEC
References (13)
URL | Date | SRC |
---|