Lucene search

K
rosalinuxROSA LABROSA-SA-2024-2381
HistoryMar 26, 2024 - 11:41 a.m.

Advisory ROSA-SA-2024-2381

2024-03-2611:41:42
ROSA LAB
abf.rosalinux.ru
14
rsyslog
rosa virtualization
cve-2022-24903
buffer overflow
remote code execution
yum update

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

Low

EPSS

0.191

Percentile

96.3%

Software: rsyslog 8.1911.0
OS: ROSA Virtualization 2.1

package_evr_string: rsyslog-8.1911.0-6.0.1.rv3

CVE-ID: CVE-2022-24903
BDU-ID: 2022-04363
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the TCP modules of the Rsyslog log processing software utility is related to writing beyond buffer boundaries in memory. Exploitation of the vulnerability could allow an attacker acting remotely to execute arbitrary code
CVE-STATUS: Fixed
CVE-REV: Execute yum update rsyslog to close.

OSVersionArchitecturePackageVersionFilename
ROSAanynoarchrsyslog<Β 8.1911.0UNKNOWN

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

Low

EPSS

0.191

Percentile

96.3%