First published: Fri Mar 23 2018(Updated: )
librelp version 1.2.14 and earlier contains a Buffer Overflow vulnerability in the checking of x509 certificates from a peer that can result in Remote code execution. This attack appear to be exploitable a remote attacker that can connect to rsyslog and trigger a stack buffer overflow by sending a specially crafted x509 certificate. Upstream patch: <a href="https://github.com/rsyslog/librelp/commit/2cfe657672636aa5d7d2a14cfcb0a6ab9d1f00cf">https://github.com/rsyslog/librelp/commit/2cfe657672636aa5d7d2a14cfcb0a6ab9d1f00cf</a> References: <a href="https://lgtm.com/rules/1505913226124/">https://lgtm.com/rules/1505913226124/</a> <a href="https://github.com/rsyslog/librelp/blob/532aa362f0f7a8d037505b0a27a1df452f9bac9e/src/tcp.c#L1205">https://github.com/rsyslog/librelp/blob/532aa362f0f7a8d037505b0a27a1df452f9bac9e/src/tcp.c#L1205</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rsyslog librelp | <=1.2.14 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =6.6 | |
Redhat Enterprise Linux Server Aus | =7.2 | |
Redhat Enterprise Linux Server Aus | =7.3 | |
Redhat Enterprise Linux Server Aus | =7.4 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =6.7 | |
Redhat Enterprise Linux Server Eus | =7.3 | |
Redhat Enterprise Linux Server Eus | =7.4 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =6.6 | |
Redhat Enterprise Linux Server Tus | =7.2 | |
Redhat Enterprise Linux Server Tus | =7.3 | |
Redhat Enterprise Linux Server Tus | =7.4 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
redhat/librelp | <1.2.15 | 1.2.15 |
ubuntu/librelp | <1.2.14-3ubuntu0.1~ | 1.2.14-3ubuntu0.1~ |
ubuntu/librelp | <1.2.2-2ubuntu1.1 | 1.2.2-2ubuntu1.1 |
ubuntu/librelp | <1.2.15-1 | 1.2.15-1 |
ubuntu/librelp | <1.2.9-1ubuntu0.1~ | 1.2.9-1ubuntu0.1~ |
debian/librelp | 1.10.0-1 1.11.0-1 |
https://github.com/rsyslog/librelp/blob/532aa362f0f7a8d037505b0a27a1df452f9bac9e/src/tcp.c#L1205
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000140 is a Buffer Overflow vulnerability in rsyslog librelp version 1.2.14 and earlier.
CVE-2018-1000140 has a severity rating of 9.8 (Critical).
CVE-2018-1000140 can be exploited by a remote attacker who can connect to rsyslog and trigger a stack buffer overflow.
To fix CVE-2018-1000140, update to rsyslog librelp version 1.2.15.
You can find more information about CVE-2018-1000140 at the following references: [1] [2] [3].