CVE-2008-5617
Published: 17 December 2008
The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.
Priority
Status
Package | Release | Status |
---|---|---|
rsyslog Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
gutsy |
Does not exist
|
|
hardy |
Ignored
(end of life)
|
|
intrepid |
Ignored
(end of life, was needed)
|
|
jaunty |
Not vulnerable
(3.18.6-2)
|
|
karmic |
Not vulnerable
(3.18.6-2)
|
|
lucid |
Not vulnerable
(3.18.6-2)
|
|
maverick |
Not vulnerable
(3.18.6-2)
|
|
natty |
Not vulnerable
(3.18.6-2)
|
|
upstream |
Released
(3.18.6-1)
|