CVE-2008-5617 Details

CVE-2008-5617

Published: 2008-12-17
Last Modified: 2017-08-08
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

Analysis
Common Vulnerability Score System v2.0
Severity High
Base Score 8.5/10
Exploit Score 10/10
Access Vector Network
Access Complexity Low
Authentication None
Impact Score 7.8/10
Confidentiality Impact None
Availability Impact Complete
Integrity Impact Partial
Vector String AV:N/AC:L/Au:N/C:N/I:P/A:C
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.12.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.12.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.12.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.12.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.13.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.15.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.15.1:beta:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.17.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.17.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.17.4:beta:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.17.5:beta:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.19.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.19.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.19.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.19.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.19.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.19.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.19.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.19.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.19.8:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.19.9:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.19.10:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.19.11:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.19.12:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:* Yes - -
References

http://secunia.com/advisories/32857
http://www.rsyslog.com/Article322.phtml
http://www.rsyslog.com/Article327.phtml
http://www.rsyslog.com/Topic4.phtml
http://www.securityfocus.com/bid/32630
https://exchange.xforce.ibmcloud.com/vulnerabilities/47080

CVE ID
CVE-2008-5617
Published
2008-12-17
Modified
2017-08-08
CVSSv2.0
High
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE-264

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.