oss-sec mailing list archives

Re: CVE Request -- rsyslog -- DoS due integer signedness error while extending rsyslog counted string buffer


From: Jan Lieskovsky <jlieskov () redhat com>
Date: Thu, 22 Dec 2011 18:21:14 +0100


Hi Kyle,

On 12/22/2011 05:00 PM, Kyle Creyts wrote:
This only applies when imfile is enabled, however, correct?

Yes, this issue requires the imfile rsyslog module to be enabled.

Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

On Dec 22, 2011 7:20 AM, "Jan Lieskovsky"<jlieskov () redhat com>  wrote:


An integer signedness error, leading to heap based buffer overflow was
found in
the way the imfile module of rsyslog, an enhanced system logging and kernel
message trapping daemon, processed text files larger than 64 KB. When the
imfile rsyslog module was enabled, a local attacker could use this flaw to
cause denial of service (rsyslogd daemon hang) via specially-crafted
message,
to be logged.

Upstream bug report:
[1] http://bugzilla.adiscon.com/**show_bug.cgi?id=221<http://bugzilla.adiscon.com/show_bug.cgi?id=221>

Upstream patch:
[2] http://git.adiscon.com/?p=**rsyslog.git;a=commit;h=**
6bad782f154b7f838c7371bf99c13f**6dc4ec4101<http://git.adiscon.com/?p=rsyslog.git;a=commit;h=6bad782f154b7f838c7371bf99c13f6dc4ec4101>

References:
[3] https://bugzilla.redhat.com/**show_bug.cgi?id=769822<https://bugzilla.redhat.com/show_bug.cgi?id=769822>

Could you allocate a CVE id for this?

Thank you&&  Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team




Current thread: