CVE-2008-5617

high

Description

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/47080

http://www.securityfocus.com/bid/32630

http://www.rsyslog.com/Topic4.phtml

http://www.rsyslog.com/Article327.phtml

http://www.rsyslog.com/Article322.phtml

http://secunia.com/advisories/32857

Details

Source: Mitre, NVD

Published: 2008-12-17

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:C

Severity: High

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Severity: High