A Denial of Service vulnerability has been discovered in Syslog-ng.
Package | app-admin/syslog-ng on all architectures |
---|---|
Affected versions | < 2.0.6 |
Unaffected versions | >= 2.0.6 |
Syslog-ng is a flexible and scalable system logger.
Oriol Carreras reported a NULL pointer dereference in the log_msg_parse() function when processing timestamps without a terminating whitespace character.
A remote attacker could send a specially crafted event to a vulnerable Syslog-ng server, resulting in a crash.
There is no known workaround at this time.
All Syslog-ng users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/syslog-ng-2.0.6"
Release date
December 29, 2007
Latest revision
December 29, 2007: 01
Severity
normal
Exploitable
remote
Bugzilla entries