{
  "threat_severity" : "Moderate",
  "public_date" : "2013-07-05T00:00:00Z",
  "bugzilla" : {
    "description" : "rsyslog: double free flaw in ElasticSearch plugin",
    "id" : "981719",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=981719"
  },
  "cvss" : {
    "cvss_base_score" : "5.4",
    "cvss_scoring_vector" : "AV:A/AC:M/Au:N/C:P/I:P/A:P",
    "status" : "draft"
  },
  "details" : [ "Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response." ],
  "statement" : "Not Vulnerable. This issue does not affect the version of rsyslog as shipped with Red Hat Enterprise Linux 5 and 6.",
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "rsyslog",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "rsyslog",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2013-4758\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-4758" ],
  "name" : "CVE-2013-4758",
  "csaw" : false
}