cpe:/a:rsyslog:rsyslog:4.1.0 cpe:/a:rsyslog:rsyslog:4.1.1 cpe:/a:rsyslog:rsyslog:4.1.2 cpe:/a:rsyslog:rsyslog:4.1.3 cpe:/a:rsyslog:rsyslog:4.1.4 cpe:/a:rsyslog:rsyslog:4.1.5 cpe:/a:rsyslog:rsyslog:4.1.6 cpe:/a:rsyslog:rsyslog:4.1.7 cpe:/a:rsyslog:rsyslog:4.2.0 cpe:/a:rsyslog:rsyslog:4.3.0 cpe:/a:rsyslog:rsyslog:4.3.1 cpe:/a:rsyslog:rsyslog:4.3.2 cpe:/a:rsyslog:rsyslog:4.4.0 cpe:/a:rsyslog:rsyslog:4.4.1 cpe:/a:rsyslog:rsyslog:4.4.2 cpe:/a:rsyslog:rsyslog:4.5.0 cpe:/a:rsyslog:rsyslog:4.5.1 cpe:/a:rsyslog:rsyslog:4.5.2 cpe:/a:rsyslog:rsyslog:4.5.3 cpe:/a:rsyslog:rsyslog:4.5.4 cpe:/a:rsyslog:rsyslog:4.5.5 cpe:/a:rsyslog:rsyslog:4.5.6 cpe:/a:rsyslog:rsyslog:4.5.7 cpe:/a:rsyslog:rsyslog:4.5.8 cpe:/a:rsyslog:rsyslog:4.6.0 cpe:/a:rsyslog:rsyslog:4.6.1 cpe:/a:rsyslog:rsyslog:4.6.2 cpe:/a:rsyslog:rsyslog:4.6.3 cpe:/a:rsyslog:rsyslog:4.6.4 cpe:/a:rsyslog:rsyslog:4.6.5 cpe:/a:rsyslog:rsyslog:5.1.0 cpe:/a:rsyslog:rsyslog:5.1.1 cpe:/a:rsyslog:rsyslog:5.1.2 cpe:/a:rsyslog:rsyslog:5.1.3 cpe:/a:rsyslog:rsyslog:5.1.4 cpe:/a:rsyslog:rsyslog:5.1.5 cpe:/a:rsyslog:rsyslog:5.1.6 cpe:/a:rsyslog:rsyslog:5.2.0 cpe:/a:rsyslog:rsyslog:5.2.1 cpe:/a:rsyslog:rsyslog:5.2.2 cpe:/a:rsyslog:rsyslog:5.3.1 cpe:/a:rsyslog:rsyslog:5.3.2 cpe:/a:rsyslog:rsyslog:5.3.3 cpe:/a:rsyslog:rsyslog:5.3.4 cpe:/a:rsyslog:rsyslog:5.3.5 cpe:/a:rsyslog:rsyslog:5.3.6 cpe:/a:rsyslog:rsyslog:5.3.7 cpe:/a:rsyslog:rsyslog:5.4.0 cpe:/a:rsyslog:rsyslog:5.4.1 cpe:/a:rsyslog:rsyslog:5.4.2 cpe:/a:rsyslog:rsyslog:5.5.0 cpe:/a:rsyslog:rsyslog:5.5.1 cpe:/a:rsyslog:rsyslog:5.5.2 cpe:/a:rsyslog:rsyslog:5.5.3 cpe:/a:rsyslog:rsyslog:5.5.4 cpe:/a:rsyslog:rsyslog:5.5.5 cpe:/a:rsyslog:rsyslog:5.5.6 cpe:/a:rsyslog:rsyslog:5.5.7 cpe:/a:rsyslog:rsyslog:5.6.0 cpe:/a:rsyslog:rsyslog:5.6.1 cpe:/a:rsyslog:rsyslog:5.6.2 cpe:/a:rsyslog:rsyslog:5.6.3 cpe:/a:rsyslog:rsyslog:5.6.4 cpe:/a:rsyslog:rsyslog:5.6.5 cpe:/a:rsyslog:rsyslog:5.7.0 cpe:/a:rsyslog:rsyslog:5.7.1 cpe:/a:rsyslog:rsyslog:5.7.2 cpe:/a:rsyslog:rsyslog:5.7.3 cpe:/a:rsyslog:rsyslog:6.1.0 cpe:/a:rsyslog:rsyslog:6.1.1 cpe:/a:rsyslog:rsyslog:6.1.2 cpe:/a:rsyslog:rsyslog:6.1.3 CVE-2011-4623 2012-09-25T19:55:01.033-04:00 2012-09-26T00:00:00.000-04:00 2.1 LOCAL LOW NONE NONE NONE PARTIAL http://nvd.nist.gov 2012-09-26T11:43:00.000-04:00 SECTRACK 1026556 SECUNIA 45848 SECUNIA 47698 BID 51171 UBUNTU USN-1338-1 MLIST [oss-security] 20111222 Re: CVE Request -- rsyslog -- DoS due integer signedness error while extending rsyslog counted string buffer CONFIRM http://bugzilla.adiscon.com/show_bug.cgi?id=221 CONFIRM http://git.adiscon.com/?p=rsyslog.git;a=commit;h=6bad782f154b7f838c7371bf99c13f6dc4ec4101 CONFIRM http://rsyslog.com/changelog-for-4-6-6-v4-stable/ CONFIRM http://rsyslog.com/changelog-for-5-7-4-v5-beta/ CONFIRM http://rsyslog.com/changelog-for-6-1-4-devel/ MISC https://bugzilla.redhat.com/show_bug.cgi?id=769822 Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.