First published: Mon May 30 2011(Updated: )
A denial of service flaw was found in the way syslog-ng processed certain log patterns, when 'global' flag was speficied and PCRE backend was used for matching. A remote attacker could use this flaw to cause excessive memory use by the syslog-ng process via specially-crafted pattern. References: [1] <a href="http://www.securityfocus.com/bid/47800/info">http://www.securityfocus.com/bid/47800/info</a> [2] <a href="https://lists.balabit.hu/pipermail/syslog-ng/2011-May/016576.html">https://lists.balabit.hu/pipermail/syslog-ng/2011-May/016576.html</a> Upstream patch: [3] <a href="http://git.balabit.hu/?p=bazsi/syslog-ng-3.2.git;a=commit;h=09710c0b105e579d35c7b5f6c66d1ea5e3a3d3ff">http://git.balabit.hu/?p=bazsi/syslog-ng-3.2.git;a=commit;h=09710c0b105e579d35c7b5f6c66d1ea5e3a3d3ff</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Balabit Syslog-ng Open Source Edition |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-709088 is categorized as a denial of service vulnerability.
To fix REDHAT-BUG-709088, update your Balabit syslog-ng to the latest version where the vulnerability is addressed.
Balabit syslog-ng users utilizing the 'global' flag with the PCRE backend for log pattern matching are affected by REDHAT-BUG-709088.
REDHAT-BUG-709088 can lead to excessive memory usage in the syslog-ng process, potentially causing a denial of service.
Yes, a remote attacker can exploit REDHAT-BUG-709088 by sending specially-crafted log patterns to the syslog-ng service.