[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: Re: [oss-security] CVE Request -- rsyslog -- DoS due integer signedness
From: Jan Lieskovsky <jlieskov () redhat ! com>
Date: 2011-12-22 17:21:14
Message-ID: 4EF3670A.5030007 () redhat ! com
[Download RAW message or body]
Hi Kyle,
On 12/22/2011 05:00 PM, Kyle Creyts wrote:
> This only applies when imfile is enabled, however, correct?
Yes, this issue requires the imfile rsyslog module to be enabled.
Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team
> On Dec 22, 2011 7:20 AM, "Jan Lieskovsky"<jlieskov@redhat.com> wrote:
>
> >
> > An integer signedness error, leading to heap based buffer overflow was
> > found in
> > the way the imfile module of rsyslog, an enhanced system logging and kernel
> > message trapping daemon, processed text files larger than 64 KB. When the
> > imfile rsyslog module was enabled, a local attacker could use this flaw to
> > cause denial of service (rsyslogd daemon hang) via specially-crafted
> > message,
> > to be logged.
> >
> > Upstream bug report:
> > [1] http://bugzilla.adiscon.com/**show_bug.cgi?id=221<http://bugzilla.adiscon.com/show_bug.cgi?id=221>
> >
> > Upstream patch:
> > [2] http://git.adiscon.com/?p=**rsyslog.git;a=commit;h=**
> > 6bad782f154b7f838c7371bf99c13f**6dc4ec4101<http://git.adiscon.com/?p=rsyslog.git;a=commit;h=6bad782f154b7f838c7371bf99c13f6dc4ec4101>
> >
> > References:
> > [3] https://bugzilla.redhat.com/**show_bug.cgi?id=769822<https://bugzilla.redhat.com/show_bug.cgi?id=769822>
> >
> > Could you allocate a CVE id for this?
> >
> > Thank you&& Regards, Jan.
> > --
> > Jan iankko Lieskovsky / Red Hat Security Response Team
> >
>
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic