Summary
Mancha discovered a vulnerability in rsyslog, a system for log processing. This vulnerability is an integer overflow that can be triggered by malformed messages to a server, if this one accepts data from untrusted sources, provoking message loss.
This vulnerability can be seen as an incomplete fix of CVE-2014-3634
(DSA 3040-1).
Solution
For the stable distribution (wheezy), this problem has been fixed in version 5.8.11-3+deb7u2.
For the testing distribution (jessie), this problem has been fixed in version 8.4.2-1.
For the unstable distribution (sid), this problem has been fixed in version 8.4.2-1.
We recommend that you upgrade your rsyslog packages.
Insight
Rsyslog is a multi-threaded implementation of syslogd (a system utility providing support for message logging), with features that include:
* reliable syslog over TCP, SSL/TLS and RELP
* on-demand disk buffering
* email alerting
* writing to MySQL or PostgreSQL databases (via separate output plugins) * permitted sender lists
* filtering on any part of the syslog message
* on-the-wire message compression
* fine-grained output format control
* failover to backup destinations
* enterprise-class encrypted syslog relaying
Affected
rsyslog on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2014-3634, CVE-2014-3683 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities