ID CVE-2011-4623
Summary Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.
References
Vulnerable Configurations
  • cpe:2.3:a:rsyslog:rsyslog:4.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:4.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:4.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:5.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:5.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:6.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:6.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:6.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:6.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:6.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:6.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rsyslog:rsyslog:6.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:rsyslog:rsyslog:6.1.2:*:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 13-02-2023 - 01:21)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:N/I:N/A:P
redhat via4
advisories
bugzilla
id 820996
title rsyslog writes debug messages to fd 1 even after forking
oval
OR
  • comment Red Hat Enterprise Linux must be installed
    oval oval:com.redhat.rhba:tst:20070304026
  • AND
    • comment Red Hat Enterprise Linux 6 is installed
      oval oval:com.redhat.rhba:tst:20111656003
    • OR
      • AND
        • comment rsyslog is earlier than 0:5.8.10-2.el6
          oval oval:com.redhat.rhsa:tst:20120796001
        • comment rsyslog is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20111247002
      • AND
        • comment rsyslog-gnutls is earlier than 0:5.8.10-2.el6
          oval oval:com.redhat.rhsa:tst:20120796003
        • comment rsyslog-gnutls is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20111247004
      • AND
        • comment rsyslog-gssapi is earlier than 0:5.8.10-2.el6
          oval oval:com.redhat.rhsa:tst:20120796005
        • comment rsyslog-gssapi is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20111247006
      • AND
        • comment rsyslog-mysql is earlier than 0:5.8.10-2.el6
          oval oval:com.redhat.rhsa:tst:20120796007
        • comment rsyslog-mysql is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20111247008
      • AND
        • comment rsyslog-pgsql is earlier than 0:5.8.10-2.el6
          oval oval:com.redhat.rhsa:tst:20120796009
        • comment rsyslog-pgsql is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20111247010
      • AND
        • comment rsyslog-relp is earlier than 0:5.8.10-2.el6
          oval oval:com.redhat.rhsa:tst:20120796011
        • comment rsyslog-relp is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20111247012
      • AND
        • comment rsyslog-snmp is earlier than 0:5.8.10-2.el6
          oval oval:com.redhat.rhsa:tst:20120796013
        • comment rsyslog-snmp is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120796014
rhsa
id RHSA-2012:0796
released 2012-06-19
severity Moderate
title RHSA-2012:0796: rsyslog security, bug fix, and enhancement update (Moderate)
rpms
  • rsyslog-0:5.8.10-2.el6
  • rsyslog-debuginfo-0:5.8.10-2.el6
  • rsyslog-gnutls-0:5.8.10-2.el6
  • rsyslog-gssapi-0:5.8.10-2.el6
  • rsyslog-mysql-0:5.8.10-2.el6
  • rsyslog-pgsql-0:5.8.10-2.el6
  • rsyslog-relp-0:5.8.10-2.el6
  • rsyslog-snmp-0:5.8.10-2.el6
refmap via4
bid 51171
confirm
misc https://bugzilla.redhat.com/show_bug.cgi?id=769822
mlist [oss-security] 20111222 Re: CVE Request -- rsyslog -- DoS due integer signedness error while extending rsyslog counted string buffer
sectrack 1026556
secunia
  • 45848
  • 47698
ubuntu USN-1338-1
Last major update 13-02-2023 - 01:21
Published 25-09-2012 - 23:55
Last modified 13-02-2023 - 01:21
Back to Top