[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE Request -- rsyslog -- DoS due integer signedness
From:       Jan Lieskovsky <jlieskov () redhat ! com>
Date:       2011-12-22 17:21:14
Message-ID: 4EF3670A.5030007 () redhat ! com
[Download RAW message or body]


Hi Kyle,

On 12/22/2011 05:00 PM, Kyle Creyts wrote:
> This only applies when imfile is enabled, however, correct?

Yes, this issue requires the imfile rsyslog module to be enabled.

Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

> On Dec 22, 2011 7:20 AM, "Jan Lieskovsky"<jlieskov@redhat.com>  wrote:
> 
> > 
> > An integer signedness error, leading to heap based buffer overflow was
> > found in
> > the way the imfile module of rsyslog, an enhanced system logging and kernel
> > message trapping daemon, processed text files larger than 64 KB. When the
> > imfile rsyslog module was enabled, a local attacker could use this flaw to
> > cause denial of service (rsyslogd daemon hang) via specially-crafted
> > message,
> > to be logged.
> > 
> > Upstream bug report:
> > [1] http://bugzilla.adiscon.com/**show_bug.cgi?id=221<http://bugzilla.adiscon.com/show_bug.cgi?id=221>
> >  
> > Upstream patch:
> > [2] http://git.adiscon.com/?p=**rsyslog.git;a=commit;h=**
> > 6bad782f154b7f838c7371bf99c13f**6dc4ec4101<http://git.adiscon.com/?p=rsyslog.git;a=commit;h=6bad782f154b7f838c7371bf99c13f6dc4ec4101>
> >  
> > References:
> > [3] https://bugzilla.redhat.com/**show_bug.cgi?id=769822<https://bugzilla.redhat.com/show_bug.cgi?id=769822>
> >  
> > Could you allocate a CVE id for this?
> > 
> > Thank you&&  Regards, Jan.
> > --
> > Jan iankko Lieskovsky / Red Hat Security Response Team
> > 
> 


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic