7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.7 High
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
82.2%
Debian Security Advisory DSA-5369-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
March 05, 2023 https://www.debian.org/security/faq
Package : syslog-ng
CVE ID : CVE-2022-38725
It was discovered that an integer overflow in the RFC3164 parser of
syslog-ng, a system logging daemon, may result in denial of service
via malformed syslog messages.
For the stable distribution (bullseye), this problem has been fixed in
version 3.28.1-2+deb11u1.
We recommend that you upgrade your syslog-ng packages.
For the detailed security status of syslog-ng please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/syslog-ng
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 11 | s390x | syslog-ng-mod-mongodb | < 3.28.1-2+deb11u1 | syslog-ng-mod-mongodb_3.28.1-2+deb11u1_s390x.deb |
Debian | 10 | arm64 | syslog-ng-dbg | < 3.19.1-5+deb10u1 | syslog-ng-dbg_3.19.1-5+deb10u1_arm64.deb |
Debian | 10 | arm64 | syslog-ng-mod-stomp | < 3.19.1-5+deb10u1 | syslog-ng-mod-stomp_3.19.1-5+deb10u1_arm64.deb |
Debian | 11 | amd64 | syslog-ng-core | < 3.28.1-2+deb11u1 | syslog-ng-core_3.28.1-2+deb11u1_amd64.deb |
Debian | 11 | armel | syslog-ng-mod-riemann | < 3.28.1-2+deb11u1 | syslog-ng-mod-riemann_3.28.1-2+deb11u1_armel.deb |
Debian | 10 | amd64 | syslog-ng-mod-snmptrapd-parser | < 3.19.1-5+deb10u1 | syslog-ng-mod-snmptrapd-parser_3.19.1-5+deb10u1_amd64.deb |
Debian | 11 | armhf | syslog-ng-mod-getent | < 3.28.1-2+deb11u1 | syslog-ng-mod-getent_3.28.1-2+deb11u1_armhf.deb |
Debian | 11 | all | syslog-ng-mod-extra | < 3.28.1-2+deb11u1 | syslog-ng-mod-extra_3.28.1-2+deb11u1_all.deb |
Debian | 11 | i386 | syslog-ng-core | < 3.28.1-2+deb11u1 | syslog-ng-core_3.28.1-2+deb11u1_i386.deb |
Debian | 11 | armel | syslog-ng-mod-geoip2 | < 3.28.1-2+deb11u1 | syslog-ng-mod-geoip2_3.28.1-2+deb11u1_armel.deb |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.7 High
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
82.2%