The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.
2008-12-17T02:30:00.203
2025-04-09T00:30:58.490
Deferred
CVSSv2: 8.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:P/A:C
10.0
7.8
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | rsyslog | rsyslog | 3.12.1 | Yes |
Application | rsyslog | rsyslog | 3.12.2 | Yes |
Application | rsyslog | rsyslog | 3.12.3 | Yes |
Application | rsyslog | rsyslog | 3.12.4 | Yes |
Application | rsyslog | rsyslog | 3.12.5 | Yes |
Application | rsyslog | rsyslog | 3.13.0 | Yes |
Application | rsyslog | rsyslog | 3.15.0 | Yes |
Application | rsyslog | rsyslog | 3.15.1 | Yes |
Application | rsyslog | rsyslog | 3.17.0 | Yes |
Application | rsyslog | rsyslog | 3.17.1 | Yes |
Application | rsyslog | rsyslog | 3.17.4 | Yes |
Application | rsyslog | rsyslog | 3.17.5 | Yes |
Application | rsyslog | rsyslog | 3.19.0 | Yes |
Application | rsyslog | rsyslog | 3.19.1 | Yes |
Application | rsyslog | rsyslog | 3.19.2 | Yes |
Application | rsyslog | rsyslog | 3.19.3 | Yes |
Application | rsyslog | rsyslog | 3.19.4 | Yes |
Application | rsyslog | rsyslog | 3.19.5 | Yes |
Application | rsyslog | rsyslog | 3.19.6 | Yes |
Application | rsyslog | rsyslog | 3.19.7 | Yes |
Application | rsyslog | rsyslog | 3.19.8 | Yes |
Application | rsyslog | rsyslog | 3.19.9 | Yes |
Application | rsyslog | rsyslog | 3.19.10 | Yes |
Application | rsyslog | rsyslog | 3.19.11 | Yes |
Application | rsyslog | rsyslog | 3.19.12 | Yes |
Application | rsyslog | rsyslog | 3.20.0 | Yes |
Application | rsyslog | rsyslog | 4.1.0 | Yes |
Application | rsyslog | rsyslog | 4.1.1 | Yes |