CVE-2024-22857

Heap based buffer flow in zlog v1.1.0 to v1.2.17 in zlog_rule_new().The size of record_name is MAXLEN_PATH(1024) + 1 but file_path may have data upto MAXLEN_CFG_LINE(MAXLEN_PATH*4) + 1. So a check was missing in zlog_rule_new() while copying the record_name from file_path + 1 which caused the buffer overflow. An attacker can exploit this vulnerability to overwrite the zlog_record_fn record_func function pointer to get arbitrary code execution or potentially cause remote code execution (RCE).
Configurations

No configuration.

History

21 Nov 2024, 08:56

Type Values Removed Values Added
References () https://github.com/HardySimpson/zlog/ - () https://github.com/HardySimpson/zlog/ -
References () https://github.com/HardySimpson/zlog/blob/1a7b1a6fb956b92a4079ccc91f30da21f34ca063/src/rule.h#L30 - () https://github.com/HardySimpson/zlog/blob/1a7b1a6fb956b92a4079ccc91f30da21f34ca063/src/rule.h#L30 -
References () https://github.com/HardySimpson/zlog/pull/251 - () https://github.com/HardySimpson/zlog/pull/251 -
References () https://www.cybersecurity-help.cz/vdb/SB2024022842 - () https://www.cybersecurity-help.cz/vdb/SB2024022842 -
References () https://www.ebryx.com/blogs/arbitrary-code-execution-in-zlog-cve-2024-22857 - () https://www.ebryx.com/blogs/arbitrary-code-execution-in-zlog-cve-2024-22857 -

27 Aug 2024, 20:35

Type Values Removed Values Added
CWE CWE-122
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

19 Apr 2024, 01:15

Type Values Removed Values Added
References
  • () https://www.ebryx.com/blogs/arbitrary-code-execution-in-zlog-cve-2024-22857 -

09 Apr 2024, 21:15

Type Values Removed Values Added
Summary
  • (es) zlog 1.2.16 tiene un desbordamiento de búfer de almacenamiento dinámico en la estructura zlog_rule_s mientras crea una nueva regla que ya está definida en el archivo de configuración proporcionado. Un usuario normal puede lograr la ejecución de código arbitrario.
Summary (en) zlog 1.2.16 has a heap-based buffer overflow in struct zlog_rule_s while creating a new rule that is already defined in the provided configuration file. A regular user can achieve arbitrary code execution. (en) Heap based buffer flow in zlog v1.1.0 to v1.2.17 in zlog_rule_new().The size of record_name is MAXLEN_PATH(1024) + 1 but file_path may have data upto MAXLEN_CFG_LINE(MAXLEN_PATH*4) + 1. So a check was missing in zlog_rule_new() while copying the record_name from file_path + 1 which caused the buffer overflow. An attacker can exploit this vulnerability to overwrite the zlog_record_fn record_func function pointer to get arbitrary code execution or potentially cause remote code execution (RCE).
References
  • () https://github.com/HardySimpson/zlog/pull/251 -

07 Mar 2024, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-07 01:15

Updated : 2024-11-21 08:56


NVD link : CVE-2024-22857

Mitre link : CVE-2024-22857

CVE.ORG link : CVE-2024-22857


JSON object : View

Products Affected

No product.

CWE
CWE-122

Heap-based Buffer Overflow