Lucene search

K
cve[email protected]CVE-2008-5617
HistoryDec 17, 2008 - 2:30 a.m.

CVE-2008-5617

2008-12-1702:30:00
CWE-264
web.nvd.nist.gov
22
acl
rsyslog
access restrictions
spoof
cve-2008-5617

8.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:P/A:C

6.3 Medium

AI Score

Confidence

Low

0.013 Low

EPSS

Percentile

85.9%

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

Affected configurations

NVD
Node
rsyslogrsyslogMatch3.12.1
OR
rsyslogrsyslogMatch3.12.2
OR
rsyslogrsyslogMatch3.12.3
OR
rsyslogrsyslogMatch3.12.4
OR
rsyslogrsyslogMatch3.12.5
OR
rsyslogrsyslogMatch3.13.0
OR
rsyslogrsyslogMatch3.15.0
OR
rsyslogrsyslogMatch3.15.1beta
OR
rsyslogrsyslogMatch3.17.0
OR
rsyslogrsyslogMatch3.17.1
OR
rsyslogrsyslogMatch3.17.4beta
OR
rsyslogrsyslogMatch3.17.5beta
OR
rsyslogrsyslogMatch3.19.0
OR
rsyslogrsyslogMatch3.19.1
OR
rsyslogrsyslogMatch3.19.2
OR
rsyslogrsyslogMatch3.19.3
OR
rsyslogrsyslogMatch3.19.4
OR
rsyslogrsyslogMatch3.19.5
OR
rsyslogrsyslogMatch3.19.6
OR
rsyslogrsyslogMatch3.19.7
OR
rsyslogrsyslogMatch3.19.8
OR
rsyslogrsyslogMatch3.19.9
OR
rsyslogrsyslogMatch3.19.10
OR
rsyslogrsyslogMatch3.19.11
OR
rsyslogrsyslogMatch3.19.12
OR
rsyslogrsyslogMatch3.20.0
OR
rsyslogrsyslogMatch4.1.0
OR
rsyslogrsyslogMatch4.1.1

8.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:P/A:C

6.3 Medium

AI Score

Confidence

Low

0.013 Low

EPSS

Percentile

85.9%