CVE-2013-4758

Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:*:devel:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:6.4.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:6.5.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:6.6.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.1.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.1.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.1.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.1.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.1.6:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.1.7:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.1.8:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.1.9:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.1.10:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.1.11:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.1.12:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.2.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.2.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.2.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.2.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.2.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.2.6:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.2.7:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.3.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.3.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.3.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.3.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.3.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.3.6:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.3.7:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.3.8:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.3.9:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.3.10:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.3.11:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.3.12:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.3.13:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.3.14:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.3.15:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:7.5.0:devel:*:*:*:*:*:*

History

21 Nov 2024, 01:56

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2013/07/05/2 - () http://www.openwall.com/lists/oss-security/2013/07/05/2 -
References () http://www.rsyslog.com/rsyslog-7-4-2-v7-stable-released/ - Patch () http://www.rsyslog.com/rsyslog-7-4-2-v7-stable-released/ - Patch
References () http://www.rsyslog.com/rsyslog-7-5-2-v7-devel-released/ - Patch () http://www.rsyslog.com/rsyslog-7-5-2-v7-devel-released/ - Patch

Information

Published : 2013-10-04 17:55

Updated : 2024-11-21 01:56


NVD link : CVE-2013-4758

Mitre link : CVE-2013-4758

CVE.ORG link : CVE-2013-4758


JSON object : View

Products Affected

rsyslog

  • rsyslog
CWE
CWE-399

Resource Management Errors