First published: Thu Jan 30 2020(Updated: )
In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a use-after-free during processing of ossec-alert formatted msgs (received from authenticated remote agents and delivered to the analysisd processing queue by ossec-remoted).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OSSEC | >=2.7<=3.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8444 is a vulnerability in OSSEC-HIDS that allows a use-after-free during processing of ossec-alert formatted messages, potentially leading to remote code execution.
The severity of CVE-2020-8444 is critical, with a CVSS score of 9.8.
CVE-2020-8444 impacts OSSEC-HIDS by causing a use-after-free vulnerability in the server component responsible for log analysis, which can be exploited by authenticated remote agents to execute arbitrary code.
To mitigate the risk of CVE-2020-8444, it is recommended to upgrade OSSEC-HIDS to version 3.5.1 or later, which includes a patch for this vulnerability.
Yes, you can find references for CVE-2020-8444 at the following links: [Link 1](https://github.com/ossec/ossec-hids/issues/1817), [Link 2](https://github.com/ossec/ossec-hids/issues/1821), [Link 3](https://security.gentoo.org/glsa/202007-33).