ID CVE-2011-1951
Summary lib/logmatcher.c in Balabit syslog-ng before 3.2.4, when the global flag is set and when using PCRE 8.12 and possibly other versions, allows remote attackers to cause a denial of service (memory consumption) via a message that does not match a regular expression.
References
Vulnerable Configurations
  • cpe:2.3:a:oneidentity:syslog-ng:-:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:-:*:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:1.4.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:1.4.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:1.4.7:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:1.4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:1.4.8:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:1.4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:1.4.9:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:1.4.9:*:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:1.4.10:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:1.4.10:*:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:1.4.15:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:1.4.15:*:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:1.5.15:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:1.5.15:*:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:1.5.20:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:1.5.20:*:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:2.0:*:*:*:open_source:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:2.0:*:*:*:open_source:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:2.0:*:*:*:premium:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:2.0:*:*:*:premium:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:2.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:2.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:2.0.9-27.34.40.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:2.0.9-27.34.40.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.0:*:*:*:open_source:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.0:*:*:*:open_source:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.0:*:*:*:premium:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.0:*:*:*:premium:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.1:*:*:*:open_source:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.1:*:*:*:open_source:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.1:*:*:*:premium:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.1:*:*:*:premium:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.1:beta1:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.1:beta1:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.1:beta2:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.1:beta2:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.2:*:*:*:open_source:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.2:*:*:*:open_source:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.2:*:*:*:premium:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.2:*:*:*:premium:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.2:alpha1:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.2:alpha1:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.2:beta1:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.2:beta1:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oneidentity:syslog-ng:3.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:oneidentity:syslog-ng:3.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:pcre:pcre:8.12:*:*:*:*:*:*:*
    cpe:2.3:a:pcre:pcre:8.12:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 13-02-2023 - 04:30)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:P
refmap via4
bid 47800
confirm http://git.balabit.hu/?p=bazsi/syslog-ng-3.2.git;a=commit;h=09710c0b105e579d35c7b5f6c66d1ea5e3a3d3ff
fedora FEDORA-2011-8405
misc https://bugzilla.redhat.com/show_bug.cgi?id=709088
mlist [oss-security] 20110526 CVE Request -- syslog-ng -- Possible DoS
secunia 45122
Last major update 13-02-2023 - 04:30
Published 11-07-2011 - 20:55
Last modified 13-02-2023 - 04:30
Back to Top