First published: Mon Jan 23 2023(Updated: )
An integer overflow in the RFC3164 parser in One Identity syslog-ng 3.0 through 3.37 allows remote attackers to cause a Denial of Service via crafted syslog input that is mishandled by the tcp or network function. syslog-ng Premium Edition 7.0.30 and syslog-ng Store Box 6.10.0 are also affected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/syslog-ng | <=3.19.1-5 | 3.19.1-5+deb10u1 3.28.1-2+deb11u1 3.38.1-5 4.3.1-2 |
Oneidentity Syslog-ng | <3.38.1 | |
Oneidentity Syslog-ng | <7.0.32 | |
Oneidentity Syslog-ng Store Box | <6.0.5 | |
Oneidentity Syslog-ng Store Box | <7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38725 is an integer overflow vulnerability in the RFC3164 parser in One Identity syslog-ng 3.0 through 3.37, which allows remote attackers to cause a Denial of Service via crafted syslog input.
The affected software products include One Identity syslog-ng versions 3.0 through 3.37, syslog-ng Premium Edition 7.0.30, and syslog-ng Store Box 6.10.0.
CVE-2022-38725 can be exploited by remote attackers sending crafted syslog input that is mishandled by the tcp or network function in the syslog-ng software.
CVE-2022-38725 has a severity rating of 7.5 (high).
To fix CVE-2022-38725, update to One Identity syslog-ng version 3.38.1 or later, syslog-ng Premium Edition version 7.0.32 or later, or syslog-ng Store Box version 6.0.5 or later.