2.1
CWE
189 119 190
Advisory Published
CVE Published
Updated

CVE-2011-4623: Buffer Overflow

First published: Thu Dec 22 2011(Updated: )

An integer signedness error, leading to heap based buffer overflow was found in the way the imfile module of rsyslog, an enhanced system logging and kernel message trapping daemon, processed text files larger than 64 KB. When the imfile rsyslog module was enabled, a local attacker could use this flaw to cause denial of service (rsyslogd daemon hang) via specially-crafted message, to be logged. Upstream bug report: [1] <a href="http://bugzilla.adiscon.com/show_bug.cgi?id=221">http://bugzilla.adiscon.com/show_bug.cgi?id=221</a> Upstream patch: [2] <a href="http://git.adiscon.com/?p=rsyslog.git;a=commit;h=6bad782f154b7f838c7371bf99c13f6dc4ec4101">http://git.adiscon.com/?p=rsyslog.git;a=commit;h=6bad782f154b7f838c7371bf99c13f6dc4ec4101</a>

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
SUSE Rsyslog=4.5.6
SUSE Rsyslog=4.1.2
SUSE Rsyslog=4.5.1
SUSE Rsyslog=4.6.3
SUSE Rsyslog=4.5.2
SUSE Rsyslog=4.1.1
SUSE Rsyslog=4.4.2
SUSE Rsyslog=4.6.4
SUSE Rsyslog=4.5.4
SUSE Rsyslog=4.3.2
SUSE Rsyslog=4.1.3
SUSE Rsyslog=4.5.3
SUSE Rsyslog=4.6.1
SUSE Rsyslog=4.1.0
SUSE Rsyslog=4.5.8
SUSE Rsyslog=4.1.5
SUSE Rsyslog=4.3.0
SUSE Rsyslog=4.6.2
SUSE Rsyslog=4.5.5
SUSE Rsyslog=4.4.0
SUSE Rsyslog=4.6.0
SUSE Rsyslog=4.5.0
SUSE Rsyslog=4.1.7
SUSE Rsyslog=4.2.0
SUSE Rsyslog=4.4.1
SUSE Rsyslog=4.3.1
SUSE Rsyslog=4.6.5
SUSE Rsyslog=4.1.6
SUSE Rsyslog=4.1.4
SUSE Rsyslog=4.5.7
SUSE Rsyslog=5.5.6
SUSE Rsyslog=5.5.7
SUSE Rsyslog=5.4.2
SUSE Rsyslog=5.5.0
SUSE Rsyslog=5.5.4
SUSE Rsyslog=5.1.6
SUSE Rsyslog=5.5.1
SUSE Rsyslog=5.6.1
SUSE Rsyslog=5.3.6
SUSE Rsyslog=5.1.1
SUSE Rsyslog=5.6.4
SUSE Rsyslog=5.1.4
SUSE Rsyslog=5.5.3
SUSE Rsyslog=5.6.2
SUSE Rsyslog=5.6.0
SUSE Rsyslog=5.6.5
SUSE Rsyslog=5.1.0
SUSE Rsyslog=5.1.5
SUSE Rsyslog=5.4.0
SUSE Rsyslog=5.7.2
SUSE Rsyslog=5.3.1
SUSE Rsyslog=5.1.2
SUSE Rsyslog=5.2.0
SUSE Rsyslog=5.3.7
SUSE Rsyslog=5.2.2
SUSE Rsyslog=5.3.3
SUSE Rsyslog=5.3.2
SUSE Rsyslog=5.6.3
SUSE Rsyslog=5.5.2
SUSE Rsyslog=5.2.1
SUSE Rsyslog=5.4.1
SUSE Rsyslog=5.7.0
SUSE Rsyslog=5.7.3
SUSE Rsyslog=5.1.3
SUSE Rsyslog=5.5.5
SUSE Rsyslog=5.3.4
SUSE Rsyslog=5.7.1
SUSE Rsyslog=5.3.5
SUSE Rsyslog=6.1.1
SUSE Rsyslog=6.1.0
SUSE Rsyslog=6.1.3
SUSE Rsyslog=6.1.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2011-4623?

    CVE-2011-4623 is rated as high severity due to the potential for a local attacker to exploit the heap-based buffer overflow.

  • How do I fix CVE-2011-4623?

    To mitigate CVE-2011-4623, update the rsyslog to a version that has patched this vulnerability.

  • What software versions are affected by CVE-2011-4623?

    CVE-2011-4623 affects several versions of rsyslog, including 4.1.x through 5.7.x before the patching.

  • What type of vulnerability is CVE-2011-4623?

    CVE-2011-4623 is an integer signedness error resulting in a heap-based buffer overflow.

  • Can CVE-2011-4623 be exploited remotely?

    CVE-2011-4623 requires local access, thus it cannot be exploited remotely without prior system access.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203