A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent within short periods of time.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html | Mailing List Third Party Advisory |
https://access.redhat.com/security/cve/cve-2011-1488 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1488 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a | |
https://security-tracker.debian.org/tracker/CVE-2011-1488 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2019-11-14 02:15
Updated : 2024-02-04 20:39
NVD link : CVE-2011-1488
Mitre link : CVE-2011-1488
CVE.ORG link : CVE-2011-1488
JSON object : View
Products Affected
debian
- debian_linux
rsyslog
- rsyslog
opensuse
- opensuse
CWE
CWE-772
Missing Release of Resource after Effective Lifetime