Lucene search

K
redosRedosROS-20240403-16
HistoryApr 03, 2024 - 12:00 a.m.

ROS-20240403-16

2024-04-0300:00:00
redos.red-soft.ru
15
rsyslog
tcp
buffer overflow
vulnerability
remote code execution
unix

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

Low

EPSS

0.191

Percentile

96.3%

A vulnerability in the TCP modules of the Rsyslog log processing software utility is related to writing outside the boundaries of the
buffer in memory. Exploitation of the vulnerability could allow an attacker acting remotely to execute
arbitrary code

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64rsyslog<Β 8.2102.0-12UNKNOWN

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

Low

EPSS

0.191

Percentile

96.3%