Lucene search

K
gentooGentoo FoundationGLSA-202305-09
HistoryMay 03, 2023 - 12:00 a.m.

syslog-ng: Denial of Service

2023-05-0300:00:00
Gentoo Foundation
security.gentoo.org
12
syslog-ng
remote dos
crafted input
rfc3164 parser
upgrade
version 3.38.1

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.015

Percentile

87.1%

Background

syslog replacement with advanced filtering features.

Description

An integer overflow in the RFC3164 parser allows remote attackers to cause a denial of service via crafted syslog input that is mishandled by the tcp or network function.

Impact

Attackers with access to input syslogs over syslog-ng’s network functionality can cause a denial of service.

Workaround

There is no known workaround at this time.

Resolution

All syslog-ng users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-admin/syslog-ng-3.38.1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-admin/syslog-ng< 3.38.1UNKNOWN

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.015

Percentile

87.1%