oss-sec mailing list archives

Re: CVE Request -- rsyslog -- DoS due integer signedness error while extending rsyslog counted string buffer


From: Kyle Creyts <kyle.creyts () gmail com>
Date: Thu, 22 Dec 2011 11:00:07 -0500

This only applies when imfile is enabled, however, correct?
On Dec 22, 2011 7:20 AM, "Jan Lieskovsky" <jlieskov () redhat com> wrote:


An integer signedness error, leading to heap based buffer overflow was
found in
the way the imfile module of rsyslog, an enhanced system logging and kernel
message trapping daemon, processed text files larger than 64 KB. When the
imfile rsyslog module was enabled, a local attacker could use this flaw to
cause denial of service (rsyslogd daemon hang) via specially-crafted
message,
to be logged.

Upstream bug report:
[1] http://bugzilla.adiscon.com/**show_bug.cgi?id=221<http://bugzilla.adiscon.com/show_bug.cgi?id=221>

Upstream patch:
[2] http://git.adiscon.com/?p=**rsyslog.git;a=commit;h=**
6bad782f154b7f838c7371bf99c13f**6dc4ec4101<http://git.adiscon.com/?p=rsyslog.git;a=commit;h=6bad782f154b7f838c7371bf99c13f6dc4ec4101>

References:
[3] https://bugzilla.redhat.com/**show_bug.cgi?id=769822<https://bugzilla.redhat.com/show_bug.cgi?id=769822>

Could you allocate a CVE id for this?

Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team


Current thread: