First published: Sun Nov 02 2014(Updated: )
rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sysklogd | <=1.5 | |
Sysklogd | =1.1 | |
Sysklogd | =1.2 | |
Sysklogd | =1.3 | |
Sysklogd | =1.4 | |
Sysklogd | =1.4.1 | |
SUSE Rsyslog | <=7.6.5 | |
SUSE Rsyslog | =8.1.0 | |
SUSE Rsyslog | =8.1.1 | |
SUSE Rsyslog | =8.1.2 | |
SUSE Rsyslog | =8.1.3 | |
SUSE Rsyslog | =8.1.4 | |
SUSE Rsyslog | =8.1.5 | |
SUSE Rsyslog | =8.1.6 | |
SUSE Rsyslog | =8.2.0 | |
SUSE Rsyslog | =8.2.1 | |
SUSE Rsyslog | =8.2.2 | |
SUSE Rsyslog | =8.2.3 | |
SUSE Rsyslog | =8.3.0 | |
SUSE Rsyslog | =8.3.1 | |
SUSE Rsyslog | =8.3.2 | |
SUSE Rsyslog | =8.3.3 | |
SUSE Rsyslog | =8.3.4 | |
SUSE Rsyslog | =8.3.5 | |
SUSE Rsyslog | =8.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3634 has a moderate severity level due to its potential to cause denial of service and possibly execute arbitrary code.
To fix CVE-2014-3634, upgrade to rsyslog version 7.6.6 or later, or version 8.4.1 or later, and ensure sysklogd is updated past version 1.5.
CVE-2014-3634 can allow remote attackers to cause denial of service or potentially execute arbitrary code through a crafted priority value.
CVE-2014-3634 affects rsyslog versions prior to 7.6.6 and 8.x before 8.4.1, as well as sysklogd versions 1.5 and earlier.
The impact of CVE-2014-3634 includes possible crashes of the logging service and risks of executing unauthorized code.