First published: Tue Dec 31 2002(Updated: )
syslogd on OpenBSD 2.9 through 3.2 does not change the source IP address of syslog packets when the machine's IP addressed is changed without rebooting, e.g. via ifconfig, which can cause incorrect information to be sent to the syslog server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenBSD | =3.1 | |
OpenBSD | =2.9 | |
OpenBSD | =3.2 | |
OpenBSD | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-2280 is classified as a moderate severity vulnerability due to potential incorrect syslog information being transmitted.
To resolve CVE-2002-2280, it is recommended to reboot the OpenBSD system after changing network configurations.
CVE-2002-2280 affects OpenBSD versions 2.9, 3.0, 3.1, and 3.2.
The impact of CVE-2002-2280 is that it can lead to incorrect source IP information in syslog messages when network changes occur.
A possible workaround for CVE-2002-2280 is to manually restart the syslog service after altering network configurations.