In OSSEC-HIDS 2.7 through 3.5.0, the OS_CleanMSG function in ossec-analysisd doesn't remove or encode terminal control characters or newlines from processed log messages. In many cases, those characters are later logged. Because newlines (\n) are permitted in messages processed by ossec-analysisd, it may be possible to inject nested events into the ossec log. Use of terminal control characters may allow obfuscating events or executing commands when viewed through vulnerable terminal emulators. This may be an unauthenticated remote attack for certain types and origins of logged data.
References
Link | Resource |
---|---|
https://github.com/ossec/ossec-hids/issues/1814 | Third Party Advisory |
https://github.com/ossec/ossec-hids/issues/1821 | Third Party Advisory |
https://security.gentoo.org/glsa/202007-33 | Third Party Advisory |
https://www.ossec.net/ | Vendor Advisory |
Configurations
History
12 Sep 2022, 18:42
Type | Values Removed | Values Added |
---|---|---|
References | (GENTOO) https://security.gentoo.org/glsa/202007-33 - Third Party Advisory |
Information
Published : 2020-01-30 01:15
Updated : 2024-02-04 20:39
NVD link : CVE-2020-8445
Mitre link : CVE-2020-8445
CVE.ORG link : CVE-2020-8445
JSON object : View
Products Affected
ossec
- ossec
CWE
CWE-20
Improper Input Validation