First published: Wed Dec 17 2008(Updated: )
imudp in rsyslog 4.x before 4.1.2, 3.21 before 3.21.9 beta, and 3.20 before 3.20.2 generates a message even when it is sent by an unauthorized sender, which allows remote attackers to cause a denial of service (disk consumption) via a large number of spurious messages.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Rsyslog | =3.12.1 | |
SUSE Rsyslog | =3.20.0 | |
SUSE Rsyslog | =4.1.0 | |
SUSE Rsyslog | =4.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5618 is classified as a medium-severity vulnerability due to its potential for causing denial of service through disk consumption.
To fix CVE-2008-5618, upgrade rsyslog to version 4.1.2 or later.
The affected versions of rsyslog are 4.1.1, 4.1.0, 3.21 beta versions before 3.21.9, and 3.20 before 3.20.2.
Yes, CVE-2008-5618 can be exploited remotely by sending unauthorized messages to the rsyslog service.
The impact of CVE-2008-5618 on system performance includes potential disk consumption leading to denial of service.