Integer overflow in rsyslog before 7.6.7 and 8.x before 8.4.2 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash) via a large priority (PRI) value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3634.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2014/09/30/15 | mailing list |
http://secunia.com/advisories/61494 | third party advisory |
http://www.openwall.com/lists/oss-security/2014/10/03/1 | mailing list patch |
http://www.rsyslog.com/remote-syslog-pri-vulnerability-cve-2014-3683/ | exploit patch vendor advisory |
http://www.ubuntu.com/usn/USN-2381-1 | vendor advisory |
http://www.debian.org/security/2014/dsa-3047 | vendor advisory |
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html |