CVE-2008-5617
17.12.2008, 02:30
The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.Enginsight
Vendor | Product | Version |
---|---|---|
rsyslog | rsyslog | 3.12.1 |
rsyslog | rsyslog | 3.12.2 |
rsyslog | rsyslog | 3.12.3 |
rsyslog | rsyslog | 3.12.4 |
rsyslog | rsyslog | 3.12.5 |
rsyslog | rsyslog | 3.13.0 |
rsyslog | rsyslog | 3.15.0 |
rsyslog | rsyslog | 3.15.1:beta |
rsyslog | rsyslog | 3.17.0 |
rsyslog | rsyslog | 3.17.1 |
rsyslog | rsyslog | 3.17.4:beta |
rsyslog | rsyslog | 3.17.5:beta |
rsyslog | rsyslog | 3.19.0 |
rsyslog | rsyslog | 3.19.1 |
rsyslog | rsyslog | 3.19.2 |
rsyslog | rsyslog | 3.19.3 |
rsyslog | rsyslog | 3.19.4 |
rsyslog | rsyslog | 3.19.5 |
rsyslog | rsyslog | 3.19.6 |
rsyslog | rsyslog | 3.19.7 |
rsyslog | rsyslog | 3.19.8 |
rsyslog | rsyslog | 3.19.9 |
rsyslog | rsyslog | 3.19.10 |
rsyslog | rsyslog | 3.19.11 |
rsyslog | rsyslog | 3.19.12 |
rsyslog | rsyslog | 3.20.0 |
rsyslog | rsyslog | 4.1.0 |
rsyslog | rsyslog | 4.1.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References