A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages were logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html | Mailing List Third Party Advisory |
https://access.redhat.com/security/cve/cve-2011-1489 | Exploit Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1489 | Issue Tracking Third Party Advisory |
https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a | Patch Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2011-1489 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2019-11-14T01:25:49
Updated: 2019-11-19T19:01:08
Reserved: 2011-03-21T00:00:00
Link: CVE-2011-1489
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-11-14T02:15:10.797
Modified: 2020-08-18T15:05:57.813
Link: CVE-2011-1489
JSON object: View
Redhat Information
No data.
CWE