A flaw was found in the way rsyslog handled invalid log message priority values. In certain configurations, a local attacker, or a remote attacker able to connect to the rsyslog port, could use this flaw to crash the rsyslog daemon or, potentially in rsyslog 7.x, execute arbitrary code as the user running the rsyslog daemon.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | rsyslog | 2014-11-11 10:26 | ALAS-2014-445 |
Amazon Linux 1 | rsyslog | 2022-05-31 23:47 | ALAS-2022-1594 |
Amazon Linux 2 - Core | rsyslog | 2022-05-31 23:50 | ALAS2-2022-1803 |
Amazon Linux 2023 | rsyslog | 2023-02-17 20:41 | ALAS2023-2023-001 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv2 | 6.8 | AV:A/AC:H/Au:N/C:C/I:C/A:C |
NVD | CVSSv2 | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P |