The fileop module of the NXLog service in NXLog Community Edition 2.10.2150 allows remote attackers to cause a denial of service (daemon crash) via a crafted Syslog payload to the Syslog service. This attack requires a specific configuration. Also, the name of the directory created must use a Syslog field. (For example, on Linux it is not possible to create a .. directory. On Windows, it is not possible to create a CON directory.)
References
Link | Resource |
---|---|
https://github.com/GuillaumePetit84/CVE-2020-35488 | Exploit Mitigation Third Party Advisory |
https://gitlab.com/nxlog-public/nxlog-ce/-/blob/master/ChangeLog.txt#L2 | Release Notes Third Party Advisory |
https://github.com/GuillaumePetit84/CVE-2020-35488 | Exploit Mitigation Third Party Advisory |
https://gitlab.com/nxlog-public/nxlog-ce/-/blob/master/ChangeLog.txt#L2 | Release Notes Third Party Advisory |
Configurations
History
21 Nov 2024, 05:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/GuillaumePetit84/CVE-2020-35488 - Exploit, Mitigation, Third Party Advisory | |
References | () https://gitlab.com/nxlog-public/nxlog-ce/-/blob/master/ChangeLog.txt#L2 - Release Notes, Third Party Advisory |
Information
Published : 2021-01-05 15:15
Updated : 2024-11-21 05:27
NVD link : CVE-2020-35488
Mitre link : CVE-2020-35488
CVE.ORG link : CVE-2020-35488
JSON object : View
Products Affected
nxlog
- nxlog
CWE
CWE-502
Deserialization of Untrusted Data