SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Syslog-ng Vendors:   Scheidler, Balazs
Syslog-ng Timestamp NULL Pointer Dereference Bug Lets Remote Users Deny Service
SecurityTracker Alert ID:  1019105
SecurityTracker URL:  http://securitytracker.com/id/1019105
CVE Reference:   CVE-2007-6437   (Links to External Site)
Updated:  Dec 30 2007
Original Entry Date:  Dec 17 2007
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): prior to 2.0.6 and 2.1.8
Description:   A vulnerability was reported in Syslog-ng. A remote user can cause denial of service conditions.

A remote user can send a specially crafted timestamp value (that does not end with a space character) to trigger a NULL pointer dereference and cause the target service to crash.

The vulnerability resides in 'src/logmsg.c'.

Oriol Carreras reported this vulnerability.

Impact:   A remote user can cause the target service to crash.
Solution:   The vendor has issued fixed versions.

Open Source Edition (2.0.6), available at:

http://www.balabit.com/downloads/files/syslog-ng/sources/2.0/src/

Premium Edition (2.1.8), available at:

http://www.balabit.com/downloads/files/syslog-ng/binaries/premium-edition/

Vendor URL:  www.balabit.com/network-security/syslog-ng/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.


 Source Message Contents

Subject:  ZSA-2007-029: syslog-ng Denial of Service


--=-LWUl1c7Yx2GagrFz5+JY
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable


--------   Z o r p  S e c u r i t y  A d v i s o r y   ( Z S A ) ----------=
--
PACKAGE             : syslog-ng, syslog-ng-premium-edition
AFFECTED VERSION    : <=3D 2.0.6, 2.1.8
FIXED               : 2.0.6, 2.1.8
SUMMARY             : Denial of Service
TYPE                : remote
AFFECTED            : all platforms
ZSA-ID              : ZSA-2007-029
DATE                : Dec 14, 2007
---------------------------------------------------------------------------=
--

DESCRIPTION:

   Oriol Carreras has discovered a security vulnerability in syslog-ng, the
   multi-platform syslog-replacement application developed by BalaBit IT
   Security.

BACKGROUND:

   Earlier versions of syslog-ng Open Source Edition and syslog-ng Premium
   Edition were vulnerable to a possible Denial of Service. The latest
   release (2.0.6 for syslog-ng, 2.1.8 for syslog-ng Premium Edition) fixes=
 a
   segmentation fault which occurred when the timestamp of the incoming
   messages did not end with a space character (NULL pointer dereference).
   This is an easy Denial of Service possibility.

   Apart from the Denial of Service, no further exploits are known to be
   possible.

FURTHER INFORMATION

   For further information on syslog-ng, visit
   http://www.balabit.com/network-security/syslog-ng/
   or download the documentation of syslog-ng from
   http://www.balabit.com/support/documentation/

SOLUTION:

   We recommend that you update the affected packages immediately, or apply=
=20
   the patch referenced below:

   http://git.balabit.hu/?p=3Dbazsi/syslog-ng-2.0.git;a=3Dcommitdiff;h=3D31=
26ebad217e7fd6356f4733ca33f571aa87a170

DOWNLOAD:

   If you are a syslog-ng Open Source Edition user, download the source of =
the
   latest release from:

   http://www.balabit.com/downloads/files/syslog-ng/sources/2.0/src/


   If you are a syslog-ng Premium Edition user, or have binary subscription=
 for
   syslog-ng Open Source Edition, download the latest binaries from:

     http://www.balabit.com/downloads/files/syslog-ng/binaries/premium-edit=
ion/

   OR, if you have a platform that is supported by apt-get, use the followi=
ng
   apt sources to fetch the latest releases:

   Debian GNU/Linux
   ----------------

   etch:

     deb https://USERNAME:PASSWORD@apt.balabit.com/syslog-ng/premium/ debia=
n-etch/syslog-ng-2.1 syslog-ng-pe

   RedHat Enterprise Linux
   -----------------------

   RHEL-4

     rpm https://USERNAME:PASSWORD@apt.balabit.com/syslog-ng/premium/ rhel-=
4/syslog-ng-2.1 syslog-ng-pe

   SUSE 10
   -------

   SUSE 10.0

     rpm https://USERNAME:PASSWORD@apt.balabit.com/syslog-ng/premium/ suse-=
10.0/syslog-ng-2.1 syslog-ng-pe

   SUSE 10.1

     rpm https://USERNAME:PASSWORD@apt.balabit.com/syslog-ng/premium/ suse-=
10.1/syslog-ng-2.1 syslog-ng-pe

   HTTP can also be used in the place of HTTPS If your version of apt-get
   does not support the HTTPS protocol. When using plain HTTP,
   the username and password will not be encrypted.



--=-LWUl1c7Yx2GagrFz5+JY
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQBHZlGNthNE0K3PQTgRAnxNAJ90rBSAu1NVar1NQnwFHq/cZlArCwCghZVy
x2IphYoQ1B7Y+dknzd1Qzrk=
=RnJN
-----END PGP SIGNATURE-----

--=-LWUl1c7Yx2GagrFz5+JY--

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC