Mandriva Linux Security Advisory : rsyslog (MDVSA-2011:134-1)

Medium Nessus Plugin ID 56160


The remote Mandriva Linux host is missing one or more security updates.


A vulnerability was discovered and corrected in rsyslog :

Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message (CVE-2011-3200).

The updated packages have been patched to correct this issue.


Update the affected packages.

Plugin Details

Severity: Medium

ID: 56160

File Name: mandriva_MDVSA-2011-134.nasl

Version: $Revision: 1.8 $

Type: local

Published: 2011/09/12

Modified: 2016/05/17

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:rsyslog, p-cpe:/a:mandriva:linux:rsyslog-dbi, p-cpe:/a:mandriva:linux:rsyslog-docs, p-cpe:/a:mandriva:linux:rsyslog-gssapi, p-cpe:/a:mandriva:linux:rsyslog-mysql, p-cpe:/a:mandriva:linux:rsyslog-pgsql, p-cpe:/a:mandriva:linux:rsyslog-relp, p-cpe:/a:mandriva:linux:rsyslog-snmp, cpe:/o:mandriva:linux:2010.1, cpe:/o:mandriva:linux:2011

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2011/09/09

Reference Information

CVE: CVE-2011-3200

BID: 49413

MDVSA: 2011:134, 2011:134-1