First published: Mon May 30 2011(Updated: )
A denial of service flaw was found in the way syslog-ng processed certain log patterns, when 'global' flag was speficied and PCRE backend was used for matching. A remote attacker could use this flaw to cause excessive memory use by the syslog-ng process via specially-crafted pattern. References: [1] <a href="http://www.securityfocus.com/bid/47800/info">http://www.securityfocus.com/bid/47800/info</a> [2] <a href="https://lists.balabit.hu/pipermail/syslog-ng/2011-May/016576.html">https://lists.balabit.hu/pipermail/syslog-ng/2011-May/016576.html</a> Upstream patch: [3] <a href="http://git.balabit.hu/?p=bazsi/syslog-ng-3.2.git;a=commit;h=09710c0b105e579d35c7b5f6c66d1ea5e3a3d3ff">http://git.balabit.hu/?p=bazsi/syslog-ng-3.2.git;a=commit;h=09710c0b105e579d35c7b5f6c66d1ea5e3a3d3ff</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OneIdentity Syslog-ng | <3.2.4 | |
PCRE | =8.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1951 has been classified as a denial of service vulnerability.
To fix CVE-2011-1951, upgrade syslog-ng to version 3.2.4 or later.
An attacker can cause excessive memory usage in the syslog-ng process through specially-crafted log patterns.
Syslog-ng versions prior to 3.2.4 are affected by CVE-2011-1951.
CVE-2011-1951 specifically affects syslog-ng when the PCRE backend is used for matching.