#VU43478 Heap-based buffer overflow in rsyslog - CVE-2011-4623

 

#VU43478 Heap-based buffer overflow in rsyslog - CVE-2011-4623

Published: September 26, 2012 / Updated: December 8, 2020


Vulnerability identifier: #VU43478
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2011-4623
CWE-ID: CWE-122
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
rsyslog
Software vendor:
rsyslog.com

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4. A remote attacker can use a large file to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.

External links