Your submission was sent successfully! Close

CVE-2008-5617

Published: 17 December 2008

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

Priority

Low

Status

Package Release Status
rsyslog
Launchpad, Ubuntu, Debian
dapper Does not exist

gutsy Does not exist

hardy Ignored
(reached end-of-life)
intrepid Needed
(reached end-of-life)
jaunty Not vulnerable
(3.18.6-2)
karmic Not vulnerable
(3.18.6-2)
lucid Not vulnerable
(3.18.6-2)
maverick Not vulnerable
(3.18.6-2)
natty Not vulnerable
(3.18.6-2)
oneiric Not vulnerable
(3.18.6-2)
upstream
Released (3.18.6-1)