The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.rsyslog.com/Article327.phtml | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47080 | vdb entry |
http://www.rsyslog.com/Article322.phtml | patch vendor advisory |
http://www.rsyslog.com/Topic4.phtml | |
http://www.securityfocus.com/bid/32630 | vdb entry |
http://secunia.com/advisories/32857 | third party advisory vendor advisory |