De: Michael Biebl bi...@debian.org
Objet: Re: Bug#644611: CVE-2011-3200: Stack-based buffer overflow in the
parseLegacySyslogMsg function
À: emeric boit emericb...@yahoo.fr, 644...@bugs.debian.org
Date: Vendredi 7 octobre 2011, 18h44
Am 07.10.2011 12:55, schrieb emeric
boit:
Package: rsyslog
Version: 4.6.4-2
Severity: grave
Tags: security
CVE description:
Stack-based buffer overflow in the
parseLegacySyslogMsg function in
tools/syslogd.c in rsyslogd in rsyslog 4.6.x before
4.6.8 and 5.2.0
through 5.8.4 might allow remote attackers to cause a
denial of service
(application exit) via a long TAG in a legacy syslog
message.
Security Bug Tracker :
http://security-tracker.debian.org/tracker/CVE-2011-3200
RedHat bug : https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3200
Ubuntu Bug : http://www.ubuntu.com/usn/usn-1224-1
I've attached the patch based on Ubuntu and RedHat
patch.
TTBOMK this only affects rsyslog if it was compiled with
SSP, which the version
in squeeze isn't. Have you information that this is not the
case?
It also only affects rsyslog if you enable remote logging.
That said, Nico Golde asked me, to handle that via a stable
upload.
Michael
--
Why is it that all of the instruments seeking intelligent
life in the
universe are pointed away from Earth?
It's true with no SSP, no fatal problem seems to occur and the tag character is
usually just truncated. But I think even if SSP isn't in Squeeze by default the
problem must be corrected.
Emeric.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org