CVE-2011-3200
06.09.2011, 16:55
Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.Enginsight
Vendor | Product | Version |
---|---|---|
rsyslog | rsyslog | 4.6.0 |
rsyslog | rsyslog | 4.6.1 |
rsyslog | rsyslog | 4.6.2 |
rsyslog | rsyslog | 4.6.3 |
rsyslog | rsyslog | 4.6.4 |
rsyslog | rsyslog | 4.6.5 |
rsyslog | rsyslog | 4.6.6 |
rsyslog | rsyslog | 4.6.7 |
rsyslog | rsyslog | 5.2.0 |
rsyslog | rsyslog | 5.2.1 |
rsyslog | rsyslog | 5.2.2 |
rsyslog | rsyslog | 5.3.1 |
rsyslog | rsyslog | 5.3.2 |
rsyslog | rsyslog | 5.3.3 |
rsyslog | rsyslog | 5.3.4 |
rsyslog | rsyslog | 5.3.5 |
rsyslog | rsyslog | 5.3.6 |
rsyslog | rsyslog | 5.3.7 |
rsyslog | rsyslog | 5.4.0 |
rsyslog | rsyslog | 5.4.1 |
rsyslog | rsyslog | 5.4.2 |
rsyslog | rsyslog | 5.5.0 |
rsyslog | rsyslog | 5.5.1 |
rsyslog | rsyslog | 5.5.2 |
rsyslog | rsyslog | 5.5.3 |
rsyslog | rsyslog | 5.5.4 |
rsyslog | rsyslog | 5.5.5 |
rsyslog | rsyslog | 5.5.6 |
rsyslog | rsyslog | 5.5.7 |
rsyslog | rsyslog | 5.6.0 |
rsyslog | rsyslog | 5.6.1 |
rsyslog | rsyslog | 5.6.2 |
rsyslog | rsyslog | 5.6.3 |
rsyslog | rsyslog | 5.6.4 |
rsyslog | rsyslog | 5.6.5 |
rsyslog | rsyslog | 5.7.0 |
rsyslog | rsyslog | 5.7.1 |
rsyslog | rsyslog | 5.7.2 |
rsyslog | rsyslog | 5.7.3 |
rsyslog | rsyslog | 5.7.4 |
rsyslog | rsyslog | 5.7.5 |
rsyslog | rsyslog | 5.7.6 |
rsyslog | rsyslog | 5.7.7 |
rsyslog | rsyslog | 5.7.8 |
rsyslog | rsyslog | 5.7.9 |
rsyslog | rsyslog | 5.7.10 |
rsyslog | rsyslog | 5.8.0 |
rsyslog | rsyslog | 5.8.1 |
rsyslog | rsyslog | 5.8.2 |
rsyslog | rsyslog | 5.8.3 |
rsyslog | rsyslog | 5.8.4 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References