what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2012-100

Mandriva Linux Security Advisory 2012-100
Posted Jun 25, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-100 - An integer signedness error, leading to heap based buffer overflow was found in the way the imfile module of rsyslog, an enhanced system logging and kernel message trapping daemon, processed text files larger than 64 KB. When the imfile rsyslog module was enabled, a local attacker could use this flaw to cause denial of service via specially-crafted message, to be logged. The updated packages have been patched to correct this issue.

tags | advisory, denial of service, overflow, kernel, local
systems | linux, mandriva
advisories | CVE-2011-4623
SHA-256 | 613dfcef425f4a5b661ad286cf09803a2aa7044018ac10a963dd2f0b79087e99

Mandriva Linux Security Advisory 2012-100

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2012:100
http://www.mandriva.com/security/
_______________________________________________________________________

Package : rsyslog
Date : June 25, 2012
Affected: 2010.1
_______________________________________________________________________

Problem Description:

A vulnerability has been discovered and corrected in rsyslog:

An integer signedness error, leading to heap based buffer overflow
was found in the way the imfile module of rsyslog, an enhanced
system logging and kernel message trapping daemon, processed text
files larger than 64 KB. When the imfile rsyslog module was enabled,
a local attacker could use this flaw to cause denial of service
(rsyslogd daemon hang) via specially-crafted message, to be logged
(CVE-2011-4623).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4623
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2010.1:
380e112c14082d15cca5e1bb9919f582 2010.1/i586/rsyslog-4.6.2-3.2mdv2010.2.i586.rpm
0a485101e3f92899262a8d3082d3810f 2010.1/i586/rsyslog-dbi-4.6.2-3.2mdv2010.2.i586.rpm
5d48f21f67c1a84ef66e19288ae9567a 2010.1/i586/rsyslog-docs-4.6.2-3.2mdv2010.2.i586.rpm
80315f1b7f422b6b01fef01813e41821 2010.1/i586/rsyslog-gssapi-4.6.2-3.2mdv2010.2.i586.rpm
9a341e46b5f367c9b8b7dfdc7a989db4 2010.1/i586/rsyslog-mysql-4.6.2-3.2mdv2010.2.i586.rpm
6b6c0b4d0f5f2ebf2d376fa8c6c62049 2010.1/i586/rsyslog-pgsql-4.6.2-3.2mdv2010.2.i586.rpm
3e8209ad7b579dd01f0981e78df8f6f9 2010.1/i586/rsyslog-relp-4.6.2-3.2mdv2010.2.i586.rpm
2fe8bc6badc5dd5dfbe59b781abdd418 2010.1/i586/rsyslog-snmp-4.6.2-3.2mdv2010.2.i586.rpm
9b56fe39f76363e49aef31175980402a 2010.1/SRPMS/rsyslog-4.6.2-3.2mdv2010.2.src.rpm

Mandriva Linux 2010.1/X86_64:
80aced08b93cf7362140d6ccec9f6ccc 2010.1/x86_64/rsyslog-4.6.2-3.2mdv2010.2.x86_64.rpm
b99fac44b5f5c7577046bed76902c286 2010.1/x86_64/rsyslog-dbi-4.6.2-3.2mdv2010.2.x86_64.rpm
b5020d7f1ab2c0af693d8d900fa89f5d 2010.1/x86_64/rsyslog-docs-4.6.2-3.2mdv2010.2.x86_64.rpm
362b0e0550acc8485426fb3786c8fe6e 2010.1/x86_64/rsyslog-gssapi-4.6.2-3.2mdv2010.2.x86_64.rpm
7ebd4c311d0321fa1890939b0de43c3a 2010.1/x86_64/rsyslog-mysql-4.6.2-3.2mdv2010.2.x86_64.rpm
be3a1b1029de820708559545d37424e7 2010.1/x86_64/rsyslog-pgsql-4.6.2-3.2mdv2010.2.x86_64.rpm
11d4ec93b3d8e3e445da2a07a95fd4fc 2010.1/x86_64/rsyslog-relp-4.6.2-3.2mdv2010.2.x86_64.rpm
8e5b6cedca81e23d5c7a0cc580f666b6 2010.1/x86_64/rsyslog-snmp-4.6.2-3.2mdv2010.2.x86_64.rpm
9b56fe39f76363e49aef31175980402a 2010.1/SRPMS/rsyslog-4.6.2-3.2mdv2010.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFP6DlLmqjQ0CJFipgRAiTLAJ4kgiHE0CUbzO1YRIP/18FMgLNh1wCdFmey
wvdYm6ytB01GvBxJN34aMQk=
=04hW
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close