Vulnerability Description
The fileop module of the NXLog service in NXLog Community Edition 2.10.2150 allows remote attackers to cause a denial of service (daemon crash) via a crafted Syslog payload to the Syslog service. This attack requires a specific configuration. Also, the name of the directory created must use a Syslog field. (For example, on Linux it is not possible to create a .. directory. On Windows, it is not possible to create a CON directory.)
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nxlog | Nxlog | < 3.0.2272 |
Related Weaknesses (CWE)
References
- https://github.com/GuillaumePetit84/CVE-2020-35488ExploitMitigationThird Party Advisory
- https://gitlab.com/nxlog-public/nxlog-ce/-/blob/master/ChangeLog.txt#L2Release NotesThird Party Advisory
- https://github.com/GuillaumePetit84/CVE-2020-35488ExploitMitigationThird Party Advisory
- https://gitlab.com/nxlog-public/nxlog-ce/-/blob/master/ChangeLog.txt#L2Release NotesThird Party Advisory
FAQ
What is CVE-2020-35488?
CVE-2020-35488 is a vulnerability with a CVSS score of 7.5 (HIGH). The fileop module of the NXLog service in NXLog Community Edition 2.10.2150 allows remote attackers to cause a denial of service (daemon crash) via a crafted Syslog payload to the Syslog service. This...
How severe is CVE-2020-35488?
CVE-2020-35488 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-35488?
Check the references section above for vendor advisories and patch information. Affected products include: Nxlog Nxlog.