First published: Wed Apr 19 2017(Updated: )
A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to crash.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rsyslog | <0:8.24.0-38.el7 | 0:8.24.0-38.el7 |
redhat/rsyslog | <0:8.24.0-41.el7_7 | 0:8.24.0-41.el7_7 |
redhat/imgbased | <0:1.1.9-0.1.el7e | 0:1.1.9-0.1.el7e |
redhat/ovirt-node-ng | <0:4.3.5-0.20190717.0.el7e | 0:4.3.5-0.20190717.0.el7e |
redhat/redhat-release-virtualization-host | <0:4.3.5-2.el7e | 0:4.3.5-2.el7e |
redhat/redhat-virtualization-host | <0:4.3.5-20190722.0.el7_7 | 0:4.3.5-20190722.0.el7_7 |
redhat/rhvm-appliance | <0:4.3-20190722.0.el7 | 0:4.3-20190722.0.el7 |
Rsyslog Rsyslog | <8.27.0 | |
Redhat Virtualization Manager | =4.3 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux For Ibm Z Systems | =7.0 | |
Redhat Enterprise Linux For Power Big Endian | =7.0 | |
Redhat Enterprise Linux For Power Little Endian | =7.0 | |
Redhat Enterprise Linux For Scientific Computing | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Redhat Virtualization | =4.0 | |
Redhat Virtualization Host | =4.0 | |
Redhat Enterprise Linux | =7.0 | |
Debian Debian Linux | =9.0 |
This vulnerability requires the "imptcp" module to be enabled, and listening on a port that can potentially be reached by attackers. This module is not enabled by default in Red Hat Enterprise Linux 7. To check if imptcp is enabled, look for the string `$InputPTCPServerRun`in your rsyslog configuration.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)