oss-sec mailing list archives

Re: CVE Request - rsyslog ($allowedSender issue repost + imudp DoS)


From: "Steven M. Christey" <coley () linus mitre org>
Date: Tue, 16 Dec 2008 20:12:13 -0500 (EST)


======================================================
Name: CVE-2008-5617
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5617
Reference: CONFIRM:http://www.rsyslog.com/Article322.phtml
Reference: CONFIRM:http://www.rsyslog.com/Topic4.phtml
Reference: SECUNIA:32857
Reference: URL:http://secunia.com/advisories/32857

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does
not follow $AllowedSender directive, which allows remote attackers to
bypass intended access restrictions and spoof log messages or create a
large number of spurious messages.


======================================================
Name: CVE-2008-5618
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5618
Reference: CONFIRM:http://www.rsyslog.com/Topic4.phtml

imudp in rsyslog 4.x before 4.1.2, 3.21 before 3.21.9 beta, and 3.20
before 3.20.2 generates a message even when it is sent by an
unauthorized sender, which allows remote attackers to cause a denial
of service (disk consumption) via a large number of spurious messages.



Current thread: