The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of RSYSLOG

RSYSLOG: buffer overflow via pmcisconames.c
An attacker can trigger a buffer overflow via pmcisconames.c of RSYSLOG, in order to trigger a denial of service, and possibly to run code...
CVE-2019-17042, DLA-1952-1, FEDORA-2019-1fb95ae48d, FEDORA-2019-ea7d5876a4, openSUSE-SU-2019:2500-1, openSUSE-SU-2019:2501-1, RHSA-2020:1000-01, RHSA-2020:1702-01, SUSE-SU-2019:2937-1, SUSE-SU-2020:0424-1, SUSE-SU-2020:0512-1, VIGILANCE-VUL-30544
RSYSLOG: buffer overflow via pmaixforwardedfrom.c
An attacker can trigger a buffer overflow via pmaixforwardedfrom.c of RSYSLOG, in order to trigger a denial of service, and possibly to run code...
CVE-2019-17041, DLA-1952-1, FEDORA-2019-1fb95ae48d, FEDORA-2019-ea7d5876a4, openSUSE-SU-2019:2500-1, openSUSE-SU-2019:2501-1, RHSA-2020:1000-01, RHSA-2020:1702-01, SUSE-SU-2019:2937-1, SUSE-SU-2020:0424-1, SUSE-SU-2020:0512-1, VIGILANCE-VUL-30543
RSYSLOG: out-of-bounds memory reading via pmdb2diag.c
An attacker can force a read at an invalid address via pmdb2diag.c of RSYSLOG, in order to trigger a denial of service, or to obtain sensitive information...
CVE-2019-17040, FEDORA-2019-1fb95ae48d, FEDORA-2019-ea7d5876a4, VIGILANCE-VUL-30487
rsyslog: denial of service via Imtcp Octet-Counted TCP Framing
An attacker can trigger a fatal error via Imtcp Octet-Counted TCP Framing of rsyslog, in order to trigger a denial of service...
CVE-2018-16881, openSUSE-SU-2019:0154-1, RHBUG-1658366, RHSA-2019:2110-01, VIGILANCE-VUL-28469
RSYSLOG: buffer overflow via SanitizeMsg
An attacker can generate a buffer overflow via SanitizeMsg() of RSYSLOG, in order to trigger a denial of service, and possibly to run code...
FEDORA-2018-2818fc5308, FEDORA-2018-749f2bae28, VIGILANCE-VUL-26965
librelp: buffer overflow via X.509
An attacker can generate a buffer overflow via X.509 of librelp, in order to trigger a denial of service, and possibly to run code...
CVE-2018-1000140, DSA-4151-1, FEDORA-2018-2f9d3604d6, FEDORA-2018-6f2df5ab6c, openSUSE-SU-2018:0829-1, RHSA-2018:1223-01, RHSA-2018:1225-01, RHSA-2018:1701-01, RHSA-2018:1702-01, RHSA-2018:1703-01, RHSA-2018:1704-01, RHSA-2018:1707-01, SUSE-SU-2018:0822-1, SUSE-SU-2018:0828-1, USN-3612-1, VIGILANCE-VUL-25647
Linux kernel: denial of service via RSYSLOG and SYN Cookie Protection
An attacker can generate a fatal error via the RSYSLOG service and the SYN Cookie Protection of the Linux kernel, in order to trigger a denial of service...
CVE-2017-5972, SA148, VIGILANCE-VUL-21842
RSYSLOG: integer overflow of PRI
An attacker can generate an integer overflow via PRI in RSYSLOG, in order to trigger a denial of service, and possibly to execute code...
bulletinoct2015, CVE-2014-3683, DSA-3047-1, MDVSA-2014:196, openSUSE-SU-2014:1297-1, openSUSE-SU-2014:1298-1, SUSE-SU-2014:1294-1, USN-2381-1, VIGILANCE-VUL-15437
RSYSLOG: integer overflow of PRI
An attacker can generate an integer overflow via PRI in RSYSLOG, in order to trigger a denial of service, and possibly to execute code...
bulletinoct2015, CVE-2014-3634, DSA-3040-1, FEDORA-2014-12503, FEDORA-2014-12878, FEDORA-2014-12910, MDVSA-2014:196, MDVSA-2015:130, openSUSE-SU-2014:1297-1, openSUSE-SU-2014:1298-1, RHSA-2014:1397-01, RHSA-2014:1654-01, RHSA-2014:1671-01, SUSE-SU-2014:1294-1, USN-2381-1, VIGILANCE-VUL-15427
json-c: two vulnerabilities
An attacker can use several vulnerabilities of json-c...
bulletinoct2015, CVE-2013-6370, CVE-2013-6371, FEDORA-2014-4975, FEDORA-2014-5006, MDVSA-2014:079, MDVSA-2015:102, openSUSE-SU-2014:0558-1, RHSA-2014:0703-01, USN-2245-1, VIGILANCE-VUL-14615
Our database contains other pages. You can request a free trial to read them.

Display information about RSYSLOG: