Vulnerability Description
In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a use-after-free during processing of syscheck formatted msgs (received from authenticated remote agents and delivered to the analysisd processing queue by ossec-remoted).
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ossec | Ossec | >= 2.7, <= 3.5.0 |
Related Weaknesses (CWE)
References
- https://github.com/ossec/ossec-hids/issues/1818ExploitThird Party Advisory
- https://github.com/ossec/ossec-hids/issues/1821Third Party Advisory
- https://security.gentoo.org/glsa/202007-33Third Party Advisory
- https://www.ossec.net/Vendor Advisory
- https://github.com/ossec/ossec-hids/issues/1818ExploitThird Party Advisory
- https://github.com/ossec/ossec-hids/issues/1821Third Party Advisory
- https://security.gentoo.org/glsa/202007-33Third Party Advisory
- https://www.ossec.net/Vendor Advisory
FAQ
What is CVE-2020-8447?
CVE-2020-8447 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a use-after-free during processing of syscheck formatted msgs (received from authe...
How severe is CVE-2020-8447?
CVE-2020-8447 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-8447?
Check the references section above for vendor advisories and patch information. Affected products include: Ossec Ossec.