CVE-2011-3200
Published Sep 6, 2011
Last updated a year ago
Overview
- Description
- Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C189E19A-16F3-40C9-B480-58013C5ED16D" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0839E9A-147E-4297-AE06-34AC67471001" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A7D9B57-777D-4B0F-BFD0-2642064FFBFA" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "654A4E45-2E4D-420D-8653-B03240ED4A88" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF03E62D-026D-4C33-BB0D-9D5B788DC5C6" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32DE7607-0082-4013-812B-0777C23BA1AC" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C19BCBF2-09C1-4B2E-90C0-44086BCF5643" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:4.6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C8C0123D-3D76-418D-BE38-00C10F147DA3" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E8B8362-FB8A-47E0-AC3D-DC6A1138758D" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72D612FA-5842-400D-AADA-D2CFF3A9C2B9" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41A66E91-25CA-48D9-9876-B7BF59E24002" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52FD86EF-92A1-4FB4-9EC1-E6DFBD93499B" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC62EFFF-52BB-4B75-811B-90FABA83FF33" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31115B81-97B1-49DB-B524-1F3234F3B999" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F28E8B1-0266-4498-B255-A05B7FE22F84" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4CECA40-8267-4791-90B2-06311D33D73C" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "298BE072-6C64-4AB4-AE92-16C6ADD3B7E3" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4338B0BD-6F52-405B-AED9-2ED2B4B50AC5" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E9CDDD7-F22B-4980-BD0A-7F91E9B9D384" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CE7FF76-4F5E-4D0E-AF9A-8579C93FA472" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AF97FDB-8862-44BA-9732-15191AC8181E" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "962616FC-9BB4-4978-8011-6084931A2CD0" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83F00805-390F-4736-894E-1F5CEB1F1629" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DB45F90-FD8E-4ABA-8C26-D3A49CA684D5" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0ED3A21-75EF-438C-AC9E-1CA67985DC46" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CF11421-19E4-4DE4-849E-96BC2045CEEB" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F98CEA8A-814C-4812-9E10-874CB0967303" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F5141AA-FE13-4AE7-9F5A-873CDFDA5B2D" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E985BF5-8B9E-45C1-ADC1-B5F964EABD5B" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE7EC105-0E13-4D47-9D0A-315013657DA8" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0244736-F857-4A74-84E4-BB7F591CE7F5" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3607C1AE-E3C8-4786-8EEE-0B1D1A9B098C" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D28F99E-27B8-47F8-981A-5D9E38BEADE5" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6BA11F46-D8FE-44BD-B792-A78800AC46A5" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1FC9D6A-3E72-4E93-8EC7-A82A24F3E73E" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C0FAF7B-3BDB-4048-9040-B65145CA0267" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "995DAD4E-7B30-474C-A06C-4D5AA57071C1" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0107C61-B60E-4BC9-8D97-D1CB02B37F77" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "218031FE-C023-4637-B4CA-EC2B7633D84E" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9DF6D59-AC76-4C98-A878-B618CEE59E6E" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "826FCA60-5D6D-4606-9024-E005C6FA6170" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE08A955-0416-41AF-AFD4-8E065A1E1A9A" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6BA5F54-DAFC-48DA-BFD6-EB1414F55391" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2ADD25C5-1729-4C06-BCC5-27A99A665E51" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16EACD36-04B0-4D5F-B7E3-E625CCE445E5" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.7.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91B8BDF5-7427-4421-8E66-568FC2FC2EEB" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB647DD4-31EC-40E5-B9A7-73A6C213D3B8" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CA66A00-FB7A-4040-B8FC-9B6C48357C7B" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1EEEC6D-C50B-4C40-83E1-A8FBD813CB04" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F12BBF6-985F-4A29-9968-CFE440885BB4" }, { "criteria": "cpe:2.3:a:rsyslog:rsyslog:5.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ABE8ABAF-41AA-43D9-B72B-57C27059C2C4" } ], "operator": "OR" } ] } ]