[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-5617Date: (C)2008-12-16   (M)2023-12-22


The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 8.5
Exploit Score: 10.0
Impact Score: 7.8
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: COMPLETE
  
Reference:
BID-32630
SECUNIA-32857
http://www.rsyslog.com/Article322.phtml
http://www.rsyslog.com/Article327.phtml
http://www.rsyslog.com/Topic4.phtml
rsyslog-allowedsender-security-bypass(47080)

CWE    1
CWE-264

© SecPod Technologies