CVE-2008-5617

Published Dec 17, 2008

Last updated 7 years ago

Overview

Description
The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.
Source
cve@mitre.org
NVD status
Modified

Risk scores

CVSS 2.0

Type
Primary
Base score
8.5
Impact score
7.8
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:N/I:P/A:C

Weaknesses

nvd@nist.gov
CWE-264

Social media

Hype score
Not currently trending

Vendor comments

  • Red HatNot vulnerable. This issue did not affect the version of the rsyslog package, as shipped with Red Hat Enterprise Linux 5.

Configurations