The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2008-12-16 18:30
Updated : 2017-08-07 18:33
NVD link : CVE-2008-5617
Mitre link : CVE-2008-5617
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
rsyslog
- rsyslog