#VU43478 Heap-based buffer overflow in rsyslog - CVE-2011-4623
Published: September 26, 2012 / Updated: December 8, 2020
rsyslog
rsyslog.com
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4. A remote attacker can use a large file to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://bugzilla.adiscon.com/show_bug.cgi?id=221
- http://git.adiscon.com/?p=rsyslog.git;a=commit;h=6bad782f154b7f838c7371bf99c13f6dc4ec4101
- http://rsyslog.com/changelog-for-4-6-6-v4-stable/
- http://rsyslog.com/changelog-for-5-7-4-v5-beta/
- http://rsyslog.com/changelog-for-6-1-4-devel/
- http://secunia.com/advisories/45848
- http://secunia.com/advisories/47698
- http://www.openwall.com/lists/oss-security/2011/12/22/2
- http://www.securityfocus.com/bid/51171
- http://www.securitytracker.com/id?1026556
- http://www.ubuntu.com/usn/USN-1338-1
- https://bugzilla.redhat.com/show_bug.cgi?id=769822