Correct. Not vulnerable.

Rainer

John Chivian <[email protected]> schrieb am Do., 5. Mai 2022, 20:31:

> Hello Rainer -
>
>    Can you please confirm that the input in the following configuration
> snippet is NOT vulnerable…
>
> module(load=“imptcp")
> input(
>   type="imptcp"
>   name="userdata"
>   port="5140"
>   ruleset="userdata_input"
> *  supportoctetcountedframing="no"*
> )
>
> Thanks,
>
>
>
> On May 5, 2022, at 07:11, Rainer Gerhards via rsyslog <
> [email protected]> wrote:
>
> Dear List,
>
> there is heap buffer overflow vulnerability in rsyslog tcp reception
> components, most notably imtcp and imptcp. This can only happen in
> octet-counted mode, which is enabled by default.
>
> If the receiver ports are exposed to the public Internet AND are used
> without authentication, this can lead to remote DoS and potentially to
> remote code execution. It is unclear if remote code execution is
> actually possible. If so, it needs a very sophisticated attack.
>
> When syslog best practices with proper firewalling and authentication
> is used, thean attack can only be carried out from within the Intranet
> and authorized systems. This limits the severity of the vulnerability
> considerably (it would obviously require an attacker already to be
> present inside the internal network).
>
> Advisory:
> https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8#advisory-comment-72243
>
> A patch is available, updated packages are already available or will
> be within the next few hours. The daily stable will contain the patch
> later today.
>
> Credits to Peter Agten for initially reporting the issue and working
> with us on the resolution.
>
> Rainer
> _______________________________________________
> rsyslog mailing list
> https://lists.adiscon.net/mailman/listinfo/rsyslog
> http://www.rsyslog.com/professional-services/
> What's up with rsyslog? Follow https://twitter.com/rgerhards
> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad
> of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you
> DON'T LIKE THAT.
>
>
>
_______________________________________________
rsyslog mailing list
https://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards
NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE 
THAT.

Reply via email to