This bug was fixed in the package syslog-ng - 2.0.0-1ubuntu1.1
---------------
syslog-ng (2.0.0-1ubuntu1.1) gutsy-security; urgency=low
* SECURITY UPDATE: Allows remote attackers to cause a denial of service
(crash) via a message with a timestamp that does not contain a trailing
space, which triggers a NULL pointer dereference.
* src/logmsg.c (log_msg_parse): fixed possible NULL pointer dereference
in log message parsing, as done in upstream RCS
* References:
-
http://git.balabit.hu/?p=bazsi/syslog-ng-2.0.git;a=commitdiff;h=3126ebad217e7fd6356f4733ca33f571aa87a170
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6437
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=457334
* Closes lp: #183389
-- [EMAIL PROTECTED] (Cody A.W. Somerville) Tue, 15 Jan 2008
20:21:54 -0400
** Changed in: syslog-ng (Ubuntu Gutsy)
Status: Confirmed => Fix Released
** Changed in: syslog-ng (Ubuntu Feisty)
Status: Confirmed => Fix Released
--
[SECURITY] CVE-2007-6437 prone to denial of service attack
https://bugs.launchpad.net/bugs/183389
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs