Mandriva Linux Security Advisory : rsyslog (MDVSA-2012:100)

Low Nessus Plugin ID 59710


The remote Mandriva Linux host is missing one or more security updates.


A vulnerability has been discovered and corrected in rsyslog :

An integer signedness error, leading to heap based buffer overflow was found in the way the imfile module of rsyslog, an enhanced system logging and kernel message trapping daemon, processed text files larger than 64 KB. When the imfile rsyslog module was enabled, a local attacker could use this flaw to cause denial of service (rsyslogd daemon hang) via specially crafted message, to be logged (CVE-2011-4623).

The updated packages have been patched to correct this issue.


Update the affected packages.

Plugin Details

Severity: Low

ID: 59710

File Name: mandriva_MDVSA-2012-100.nasl

Version: $Revision: 1.8 $

Type: local

Published: 2012/06/26

Modified: 2014/12/26

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 2.1

Temporal Score: 1.8

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:rsyslog, p-cpe:/a:mandriva:linux:rsyslog-dbi, p-cpe:/a:mandriva:linux:rsyslog-docs, p-cpe:/a:mandriva:linux:rsyslog-gssapi, p-cpe:/a:mandriva:linux:rsyslog-mysql, p-cpe:/a:mandriva:linux:rsyslog-pgsql, p-cpe:/a:mandriva:linux:rsyslog-relp, p-cpe:/a:mandriva:linux:rsyslog-snmp, cpe:/o:mandriva:linux:2010.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/06/25

Reference Information

CVE: CVE-2011-4623

BID: 51171

MDVSA: 2012:100