Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2011-4623

Overview

Vulnerability Score 2.1 2.1
CVE Id CVE-2011-4623
Last Modified 26 Sep 2012 12:00:00
Published 25 Sep 2012 07:55:01
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector LOCAL
Access Complexity LOW
Authentication NONE

CVE-2011-4623

Summary

Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.

Vulnerable Systems

Application

  • Rsyslog 4.1.0

  • Rsyslog 4.1.1

  • Rsyslog 4.1.2

  • Rsyslog 4.1.3

  • Rsyslog 4.1.4

  • Rsyslog 4.1.5

  • Rsyslog 4.1.6

  • Rsyslog 4.1.7

  • Rsyslog 4.2.0

  • Rsyslog 4.3.0

  • Rsyslog 4.3.1

  • Rsyslog 4.3.2

  • Rsyslog 4.4.0

  • Rsyslog 4.4.1

  • Rsyslog 4.4.2

  • Rsyslog 4.5.0

  • Rsyslog 4.5.1

  • Rsyslog 4.5.2

  • Rsyslog 4.5.3

  • Rsyslog 4.5.4

  • Rsyslog 4.5.5

  • Rsyslog 4.5.6

  • Rsyslog 4.5.7

  • Rsyslog 4.5.8

  • Rsyslog 4.6.0

  • Rsyslog 4.6.1

  • Rsyslog 4.6.2

  • Rsyslog 4.6.3

  • Rsyslog 4.6.4

  • Rsyslog 4.6.5

  • Rsyslog 5.1.0

  • Rsyslog 5.1.1

  • Rsyslog 5.1.2

  • Rsyslog 5.1.3

  • Rsyslog 5.1.4

  • Rsyslog 5.1.5

  • Rsyslog 5.1.6

  • Rsyslog 5.2.0

  • Rsyslog 5.2.1

  • Rsyslog 5.2.2

  • Rsyslog 5.3.1

  • Rsyslog 5.3.2

  • Rsyslog 5.3.3

  • Rsyslog 5.3.4

  • Rsyslog 5.3.5

  • Rsyslog 5.3.6

  • Rsyslog 5.3.7

  • Rsyslog 5.4.0

  • Rsyslog 5.4.1

  • Rsyslog 5.4.2

  • Rsyslog 5.5.0

  • Rsyslog 5.5.1

  • Rsyslog 5.5.2

  • Rsyslog 5.5.3

  • Rsyslog 5.5.4

  • Rsyslog 5.5.5

  • Rsyslog 5.5.6

  • Rsyslog 5.5.7

  • Rsyslog 5.6.0

  • Rsyslog 5.6.1

  • Rsyslog 5.6.2

  • Rsyslog 5.6.3

  • Rsyslog 5.6.4

  • Rsyslog 5.6.5

  • Rsyslog 5.7.0

  • Rsyslog 5.7.1

  • Rsyslog 5.7.2

  • Rsyslog 5.7.3

  • Rsyslog 6.1.0

  • Rsyslog 6.1.1

  • Rsyslog 6.1.2

  • Rsyslog 6.1.3


References

MISC - https://bugzilla.redhat.com/show_bug.cgi?id=769822

UBUNTU - USN-1338-1

SECTRACK - 1026556

BID - 51171

MLIST - [oss-security] 20111222 Re: CVE Request -- rsyslog -- DoS due integer signedness error while extending rsyslog counted string buffer

SECUNIA - 47698

SECUNIA - 45848

CONFIRM - http://rsyslog.com/changelog-for-6-1-4-devel/

CONFIRM - http://rsyslog.com/changelog-for-5-7-4-v5-beta/

CONFIRM - http://rsyslog.com/changelog-for-4-6-6-v4-stable/

CONFIRM - http://git.adiscon.com/?p=rsyslog.git;a=commit;h=6bad782f154b7f838c7371bf99c13f6dc4ec4101

MISC - http://bugzilla.adiscon.com/show_bug.cgi?id=221


Last Updated: 27 May 2016 11:00:48