Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://lists.balabit.hu/pipermail/syslog-ng/", "name": "https://lists.balabit.hu/pipermail/syslog-ng/", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "https://github.com/syslog-ng/syslog-ng/security/advisories/GHSA-7932-4fc6-pvmc", "name": "https://github.com/syslog-ng/syslog-ng/security/advisories/GHSA-7932-4fc6-pvmc", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3TZ7U2GQTAHVHJXSSEHQS5D2Q5T6SZB/", "name": "FEDORA-2023-43eb573065", "tags": [], "refsource": "FEDORA"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QU36HCM3VZYANUYFC6XFYEYJEKQPA2Q7/", "name": "FEDORA-2023-3d44a41fa3", "tags": [], "refsource": "FEDORA"}, {"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00043.html", "name": "[debian-lts-announce] 20230228 [SECURITY] [DLA 3348-1] syslog-ng security update", "tags": [], "refsource": "MLIST"}, {"url": "https://www.debian.org/security/2023/dsa-5369", "name": "DSA-5369", "tags": [], "refsource": "DEBIAN"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "An integer overflow in the RFC3164 parser in One Identity syslog-ng 3.0 through 3.37 allows remote attackers to cause a Denial of Service via crafted syslog input that is mishandled by the tcp or network function. syslog-ng Premium Edition 7.0.30 and syslog-ng Store Box 6.10.0 are also affected."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-190"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2022-38725", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}}, "publishedDate": "2023-01-23T16:15Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:oneidentity:syslog-ng_store_box:*:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "7.0"}, {"cpe23Uri": "cpe:2.3:a:oneidentity:syslog-ng_store_box:*:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "6.0.5"}, {"cpe23Uri": "cpe:2.3:a:oneidentity:syslog-ng:*:*:*:*:premium:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "7.0.32"}, {"cpe23Uri": "cpe:2.3:a:oneidentity:syslog-ng:*:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "3.38.1"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2023-03-06T16:15Z"}