[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2011-4623

Date: (C)2012-09-25   (M)2015-12-16
 
CVSS Score: 2.1Access Vector: LOCAL
Exploitability Subscore: 3.9Access Complexity: LOW
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: NONE
 Availability: PARTIAL











Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.

Reference:
SECTRACK-1026556
SECUNIA-45848
SECUNIA-47698
BID-51171
USN-1338-1
http://www.openwall.com/lists/oss-security/2011/12/22/2
http://bugzilla.adiscon.com/show_bug.cgi?id=221
http://git.adiscon.com/?p=rsyslog.git;a=commit;h=6bad782f154b7f838c7371bf99c13f6dc4ec4101
http://rsyslog.com/changelog-for-4-6-6-v4-stable/
http://rsyslog.com/changelog-for-5-7-4-v5-beta/
http://rsyslog.com/changelog-for-6-1-4-devel/
https://bugzilla.redhat.com/show_bug.cgi?id=769822

CWE    1
CWE-189
OVAL    3
oval:org.secpod.oval:def:700743
oval:org.secpod.oval:def:500831
oval:org.secpod.oval:def:202371

© 2013 SecPod Technologies