CVE-2014-3634
Published: 1 October 2014
rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
Notes
Author | Note |
---|---|
mdeslaur | also see followup issue CVE-2014-3683 |
Priority
Status
Package | Release | Status |
---|---|---|
rsyslog Launchpad, Ubuntu, Debian |
lucid |
Released
(4.2.0-2ubuntu8.3)
|
precise |
Released
(5.8.6-1ubuntu8.9)
|
|
trusty |
Released
(7.4.4-1ubuntu2.3)
|
|
upstream |
Released
(8.4.1,7.6.6)
|
|
utopic |
Released
(7.4.4-1ubuntu11)
|
|
vivid |
Released
(7.4.4-1ubuntu11)
|
|
wily |
Released
(7.4.4-1ubuntu11)
|
|
xenial |
Released
(7.4.4-1ubuntu11)
|
|
yakkety |
Released
(7.4.4-1ubuntu11)
|
|
zesty |
Released
(7.4.4-1ubuntu11)
|
|
Patches: upstream: http://www.rsyslog.com/files/download/rsyslog/pri-vuln.tar.gz |
||
sysklogd Launchpad, Ubuntu, Debian |
lucid |
Ignored
(reached end-of-life)
|
precise |
Does not exist
(precise was needed)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
utopic |
Does not exist
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|