Vulnerability Details : CVE-2008-5617
The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.
Products affected by CVE-2008-5617
- cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.19.9:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.17.5:beta:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.19.3:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.19.2:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.12.5:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.17.4:beta:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.19.8:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.19.1:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.19.0:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.19.12:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.19.7:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.19.6:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.17.1:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.15.1:beta:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.17.0:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.19.11:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.19.10:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.19.5:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.19.4:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.15.0:*:*:*:*:*:*:*
- cpe:2.3:a:rsyslog:rsyslog:3.13.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-5617
1.49%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-5617
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.5
|
HIGH | AV:N/AC:L/Au:N/C:N/I:P/A:C |
10.0
|
7.8
|
NIST |
CWE ids for CVE-2008-5617
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2008-5617
-
Red Hat 2008-12-17Not vulnerable. This issue did not affect the version of the rsyslog package, as shipped with Red Hat Enterprise Linux 5.
References for CVE-2008-5617
-
http://www.rsyslog.com/Article327.phtml
Page not found - rsyslog
-
http://www.rsyslog.com/Article322.phtml
$AllowedSender not honored - rsyslogPatch;Vendor Advisory
-
http://www.securityfocus.com/bid/32630
-
http://www.rsyslog.com/Topic4.phtml
rsyslog/ChangeLog at master · rsyslog/rsyslog · GitHub
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/47080
RSyslog AllowedSender security bypass CVE-2008-5617 Vulnerability Report
Jump to