Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2008-5617


The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.


Published

2008-12-17T02:30:00.203

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 8.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:P/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

7.8

Weaknesses
  • Type: Primary
    CWE-264

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application rsyslog rsyslog 3.12.1 Yes
Application rsyslog rsyslog 3.12.2 Yes
Application rsyslog rsyslog 3.12.3 Yes
Application rsyslog rsyslog 3.12.4 Yes
Application rsyslog rsyslog 3.12.5 Yes
Application rsyslog rsyslog 3.13.0 Yes
Application rsyslog rsyslog 3.15.0 Yes
Application rsyslog rsyslog 3.15.1 Yes
Application rsyslog rsyslog 3.17.0 Yes
Application rsyslog rsyslog 3.17.1 Yes
Application rsyslog rsyslog 3.17.4 Yes
Application rsyslog rsyslog 3.17.5 Yes
Application rsyslog rsyslog 3.19.0 Yes
Application rsyslog rsyslog 3.19.1 Yes
Application rsyslog rsyslog 3.19.2 Yes
Application rsyslog rsyslog 3.19.3 Yes
Application rsyslog rsyslog 3.19.4 Yes
Application rsyslog rsyslog 3.19.5 Yes
Application rsyslog rsyslog 3.19.6 Yes
Application rsyslog rsyslog 3.19.7 Yes
Application rsyslog rsyslog 3.19.8 Yes
Application rsyslog rsyslog 3.19.9 Yes
Application rsyslog rsyslog 3.19.10 Yes
Application rsyslog rsyslog 3.19.11 Yes
Application rsyslog rsyslog 3.19.12 Yes
Application rsyslog rsyslog 3.20.0 Yes
Application rsyslog rsyslog 4.1.0 Yes
Application rsyslog rsyslog 4.1.1 Yes

References