AIX rsyslog Advisory : rsyslog_advisory.asc

high Nessus Plugin ID 79660

Synopsis

The remote AIX host has a vulnerable version of rsyslog.

Description

The version of rsyslog installed on the remote AIX host is affected by a remote code execution or denial of service vulnerability :

- The installed rsyslog allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impacts by crafting a priority (PRI) value that triggers an out-of-bounds array access. (CVE-2014-3634)

- The original fix for the above issue still retained a denial of service vulnerability when large PRI values were encountered. (CVE-2014-3683)

Solution

A fix is available and can be downloaded from the AIX website.

To extract the fixes from the tar file :

tar xvf rsyslog_fix.tar

IMPORTANT : it is recommended that a mksysb backup of the system be created if possible. Verify that it is both bootable and readable before proceeding.

To preview the fix installation :

installp -a -d rsyslog.base -p all

To install the fix package :

installp -a -d rsyslog.base -X all

See Also

https://aix.software.ibm.com/aix/efixes/security/rsyslog_advisory.asc

Plugin Details

Severity: High

ID: 79660

File Name: aix_rsyslog_advisory.nasl

Version: 1.9

Type: local

Published: 12/2/2014

Updated: 4/21/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:rsyslog:rsyslog, cpe:/o:ibm:aix

Required KB Items: Host/local_checks_enabled, Host/AIX/version, Host/AIX/lslpp

Exploit Ease: No known exploits are available

Patch Publication Date: 11/14/2014

Vulnerability Publication Date: 9/30/2014

Reference Information

CVE: CVE-2014-3634, CVE-2014-3683

BID: 70187, 70243