Access Restriction Bypass Affecting rsyslog package, versions <3.18.6-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
1.49% (87th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-RSYSLOG-1558888
  • published17 Dec 2008
  • disclosed17 Dec 2008

Introduced: 17 Dec 2008

CVE-2008-5617  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade Debian:12 rsyslog to version 3.18.6-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream rsyslog package and not the rsyslog package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

CVSS Scores

version 3.1