The fileop module of the NXLog service in NXLog Community Edition 2.10.2150 allows remote attackers to cause a denial of service (daemon crash) via a crafted Syslog payload to the Syslog service. This attack requires a specific configuration. Also, the name of the directory created must use a Syslog field. (For example, on Linux it is not possible to create a .. directory. On Windows, it is not possible to create a CON directory.)
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://github.com/GuillaumePetit84/CVE-2020-35488 | exploit third party advisory mitigation |
https://gitlab.com/nxlog-public/nxlog-ce/-/blob/master/ChangeLog.txt#L2 | third party advisory release notes |