Upstream information
Description
The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
National Vulnerability Database | |
---|---|
Base Score | 8.5 |
Vector | AV:N/AC:L/Au:N/C:N/I:P/A:C |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | Complete |
SUSE Security Advisories:
- SUSE-SR:2009:001, published Mon, 12 Jan 2009 13:00:00 +0000
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 06:35:39 2013CVE page last modified: Fri Dec 8 16:29:48 2023