Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://bugzilla.adiscon.com/show_bug.cgi?id=221 | |
http://www.ubuntu.com/usn/USN-1338-1 | patch vendor advisory |
http://rsyslog.com/changelog-for-6-1-4-devel/ | |
https://bugzilla.redhat.com/show_bug.cgi?id=769822 | |
http://git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=6bad782f154b7f838c7371bf99c13f6dc4ec4101 | |
http://www.securitytracker.com/id?1026556 | vdb entry |
http://rsyslog.com/changelog-for-5-7-4-v5-beta/ | |
http://secunia.com/advisories/45848 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/51171 | vdb entry |
http://secunia.com/advisories/47698 | third party advisory vendor advisory |
http://rsyslog.com/changelog-for-4-6-6-v4-stable/ | |
http://www.openwall.com/lists/oss-security/2011/12/22/2 | mailing list |