The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

computer vulnerability announce CVE-2014-3634

RSYSLOG: integer overflow of PRI

Synthesis of the vulnerability

An attacker can generate an integer overflow via PRI in RSYSLOG, in order to trigger a denial of service, and possibly to execute code.
Vulnerable software: Debian, Fedora, AIX, openSUSE, Solaris, RHEL, RSYSLOG, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity of this announce: 2/4.
Consequences of an intrusion: administrator access/rights, privileged access/rights, user access/rights, denial of service on server, denial of service on service.
Attacker's origin: intranet client.
Creation date: 30/09/2014.
Références of this computer vulnerability: bulletinoct2015, CVE-2014-3634, DSA-3040-1, FEDORA-2014-12503, FEDORA-2014-12878, FEDORA-2014-12910, MDVSA-2014:196, MDVSA-2015:130, openSUSE-SU-2014:1297-1, openSUSE-SU-2014:1298-1, RHSA-2014:1397-01, RHSA-2014:1654-01, RHSA-2014:1671-01, SUSE-SU-2014:1294-1, USN-2381-1, VIGILANCE-VUL-15427.

Description of the vulnerability

The RSYSLOG product analyzes messages in the SYSLOG format:
  <PRI> HEADER MSG
The PRI field indicates the priority, which is composed of the message Facility and Severity.

However, if PRI is larger than 191, an array related to the Facility overflows in RSYSLOG.

When RSYSLOG is configured to accept SYSLOG messages from the network, this vulnerability can be remotely exploited.

An attacker can therefore generate an integer overflow via PRI in RSYSLOG, in order to trigger a denial of service, and possibly to execute code.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a systems vulnerabilities watch. The technology watch team tracks security threats targeting the computer system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.