Vulnerability Description
Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rsyslog | Rsyslog | 4.1.0 |
Related Weaknesses (CWE)
References
- http://bugzilla.adiscon.com/show_bug.cgi?id=221
- http://git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=6bad782f154b7f838c7371bf99c
- http://rsyslog.com/changelog-for-4-6-6-v4-stable/
- http://rsyslog.com/changelog-for-5-7-4-v5-beta/
- http://rsyslog.com/changelog-for-6-1-4-devel/
- http://secunia.com/advisories/45848Vendor Advisory
- http://secunia.com/advisories/47698Vendor Advisory
- http://www.openwall.com/lists/oss-security/2011/12/22/2
- http://www.securityfocus.com/bid/51171
- http://www.securitytracker.com/id?1026556
- http://www.ubuntu.com/usn/USN-1338-1PatchVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=769822
- http://bugzilla.adiscon.com/show_bug.cgi?id=221
- http://git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=6bad782f154b7f838c7371bf99c
- http://rsyslog.com/changelog-for-4-6-6-v4-stable/
FAQ
What is CVE-2011-4623?
CVE-2011-4623 is a vulnerability with a CVSS score of 2.1 (LOW). Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of...
How severe is CVE-2011-4623?
CVE-2011-4623 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-4623?
Check the references section above for vendor advisories and patch information. Affected products include: Rsyslog Rsyslog.