CVE-2011-4623

Impact:
Moderate
Public Date:
2011-02-09
Bugzilla:
769822: CVE-2011-4623 rsyslog: DoS due integer signedness error while extending rsyslog counted string buffer

The MITRE CVE dictionary describes this issue as:

Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.

Find out more about CVE-2011-4623 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 5.4
Base Metrics AV:A/AC:M/Au:N/C:P/I:P/A:P
Access Vector Adjacent Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux version 6 (rsyslog) RHSA-2012:0796 2012-06-19

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 5 rsyslog Not affected