The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/32857 - Vendor Advisory | |
References | () http://www.rsyslog.com/Article322.phtml - Patch, Vendor Advisory | |
References | () http://www.rsyslog.com/Article327.phtml - | |
References | () http://www.rsyslog.com/Topic4.phtml - | |
References | () http://www.securityfocus.com/bid/32630 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/47080 - |
Information
Published : 2008-12-17 02:30
Updated : 2024-11-21 00:54
NVD link : CVE-2008-5617
Mitre link : CVE-2008-5617
CVE.ORG link : CVE-2008-5617
JSON object : View
Products Affected
rsyslog
- rsyslog
CWE
CWE-264
Permissions, Privileges, and Access Controls