2.1 CVE-2011-4623
Patch
Débordement d'entier dans la fonction rsCStrExtendBuf dans runtime/stringbuf.c dans le module imfile de rsyslog 4.x avant 4.6.6, 5.x avant 5.7.4, et 6.x avant 6.1.4 permet aux utilisateurs locaux de provoquer un déni de service (blocage du démon) via un grand fichier, qui déclenche un débordement de tampon basé sur le tas.
https://nvd.nist.gov/vuln/detail/CVE-2011-4623
Catégories
CWE-189
Références
BID
CONFIRM
http://rsyslog.com/changelog-for-5-7-4-v5-beta/ |
http://rsyslog.com/changelog-for-6-1-4-devel/ |
http://rsyslog.com/changelog-for-4-6-6-v4-stable/ |
http://bugzilla.adiscon.com/show_bug.cgi?id=221 |
MISC
https://bugzilla.redhat.com/show_bug.cgi?id=769822 |
http://git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=6bad782f154b7f838c7371bf99c13f6dc4ec4101 |
SECTRACK
SECUNIA
UBUNTU Patch
USN-1338-1 Patch Vendor Advisory |
_MLIST
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:rsyslog:rsyslog:4.5.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.5.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.6.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.5.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.4.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.6.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.5.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.3.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.1.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.5.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.6.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.5.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.1.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.6.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.5.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.4.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.6.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.1.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.4.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.3.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.6.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.1.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.1.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:4.5.7:*:*:*:*:*:*:* | ||
Configuration 2 | ||
cpe:2.3:a:rsyslog:rsyslog:5.5.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.5.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.4.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.5.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.1.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.5.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.6.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.3.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.6.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.1.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.5.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.6.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.6.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.6.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.1.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.4.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.7.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.3.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.3.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.3.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.3.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.6.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.5.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.4.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.7.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.7.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.1.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.5.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.3.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.7.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:5.3.5:*:*:*:*:*:*:* | ||
Configuration 3 | ||
cpe:2.3:a:rsyslog:rsyslog:6.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:6.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:6.1.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:rsyslog:rsyslog:6.1.2:*:*:*:*:*:*:* |
REMEDIATION
Patch
Url |
---|
USN-1338-1 |
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
Pas d'exploit connu |
Autres (github, ...)
Url |
---|
Pas d'exploit connu |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | sévérité |
---|---|---|
Pas d'entrée |
MITRE
Sherlock® flash
Prenez une photo de votre réseau informatique en quelques clics !
La solution d'audit Sherlock® flash vous permet de réaliser un audit pour renforcer la sécurité de votre parc informatique. Analyse des vulnérabilités de vos équipements physiques et virtuels. Planification des correctifs par niveau de priorité et temps disponible. Rapports détaillés et intuitifs.
