exploit the possibilities

Mandriva Linux Security Advisory 2012-100

Mandriva Linux Security Advisory 2012-100
Posted Jun 25, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-100 - An integer signedness error, leading to heap based buffer overflow was found in the way the imfile module of rsyslog, an enhanced system logging and kernel message trapping daemon, processed text files larger than 64 KB. When the imfile rsyslog module was enabled, a local attacker could use this flaw to cause denial of service via specially-crafted message, to be logged. The updated packages have been patched to correct this issue.

tags | advisory, denial of service, overflow, kernel, local
systems | linux, mandriva
advisories | CVE-2011-4623
MD5 | 9cbfeaf506f42ed876fdb65df961206e

Mandriva Linux Security Advisory 2012-100

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2012:100
http://www.mandriva.com/security/
_______________________________________________________________________

Package : rsyslog
Date : June 25, 2012
Affected: 2010.1
_______________________________________________________________________

Problem Description:

A vulnerability has been discovered and corrected in rsyslog:

An integer signedness error, leading to heap based buffer overflow
was found in the way the imfile module of rsyslog, an enhanced
system logging and kernel message trapping daemon, processed text
files larger than 64 KB. When the imfile rsyslog module was enabled,
a local attacker could use this flaw to cause denial of service
(rsyslogd daemon hang) via specially-crafted message, to be logged
(CVE-2011-4623).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4623
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2010.1:
380e112c14082d15cca5e1bb9919f582 2010.1/i586/rsyslog-4.6.2-3.2mdv2010.2.i586.rpm
0a485101e3f92899262a8d3082d3810f 2010.1/i586/rsyslog-dbi-4.6.2-3.2mdv2010.2.i586.rpm
5d48f21f67c1a84ef66e19288ae9567a 2010.1/i586/rsyslog-docs-4.6.2-3.2mdv2010.2.i586.rpm
80315f1b7f422b6b01fef01813e41821 2010.1/i586/rsyslog-gssapi-4.6.2-3.2mdv2010.2.i586.rpm
9a341e46b5f367c9b8b7dfdc7a989db4 2010.1/i586/rsyslog-mysql-4.6.2-3.2mdv2010.2.i586.rpm
6b6c0b4d0f5f2ebf2d376fa8c6c62049 2010.1/i586/rsyslog-pgsql-4.6.2-3.2mdv2010.2.i586.rpm
3e8209ad7b579dd01f0981e78df8f6f9 2010.1/i586/rsyslog-relp-4.6.2-3.2mdv2010.2.i586.rpm
2fe8bc6badc5dd5dfbe59b781abdd418 2010.1/i586/rsyslog-snmp-4.6.2-3.2mdv2010.2.i586.rpm
9b56fe39f76363e49aef31175980402a 2010.1/SRPMS/rsyslog-4.6.2-3.2mdv2010.2.src.rpm

Mandriva Linux 2010.1/X86_64:
80aced08b93cf7362140d6ccec9f6ccc 2010.1/x86_64/rsyslog-4.6.2-3.2mdv2010.2.x86_64.rpm
b99fac44b5f5c7577046bed76902c286 2010.1/x86_64/rsyslog-dbi-4.6.2-3.2mdv2010.2.x86_64.rpm
b5020d7f1ab2c0af693d8d900fa89f5d 2010.1/x86_64/rsyslog-docs-4.6.2-3.2mdv2010.2.x86_64.rpm
362b0e0550acc8485426fb3786c8fe6e 2010.1/x86_64/rsyslog-gssapi-4.6.2-3.2mdv2010.2.x86_64.rpm
7ebd4c311d0321fa1890939b0de43c3a 2010.1/x86_64/rsyslog-mysql-4.6.2-3.2mdv2010.2.x86_64.rpm
be3a1b1029de820708559545d37424e7 2010.1/x86_64/rsyslog-pgsql-4.6.2-3.2mdv2010.2.x86_64.rpm
11d4ec93b3d8e3e445da2a07a95fd4fc 2010.1/x86_64/rsyslog-relp-4.6.2-3.2mdv2010.2.x86_64.rpm
8e5b6cedca81e23d5c7a0cc580f666b6 2010.1/x86_64/rsyslog-snmp-4.6.2-3.2mdv2010.2.x86_64.rpm
9b56fe39f76363e49aef31175980402a 2010.1/SRPMS/rsyslog-4.6.2-3.2mdv2010.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFP6DlLmqjQ0CJFipgRAiTLAJ4kgiHE0CUbzO1YRIP/18FMgLNh1wCdFmey
wvdYm6ytB01GvBxJN34aMQk=
=04hW
-----END PGP SIGNATURE-----


Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

June 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    1 Files
  • 2
    Jun 2nd
    2 Files
  • 3
    Jun 3rd
    19 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    15 Files
  • 6
    Jun 6th
    12 Files
  • 7
    Jun 7th
    11 Files
  • 8
    Jun 8th
    1 Files
  • 9
    Jun 9th
    1 Files
  • 10
    Jun 10th
    15 Files
  • 11
    Jun 11th
    15 Files
  • 12
    Jun 12th
    15 Files
  • 13
    Jun 13th
    8 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    2 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    18 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close