Scientific Linux Security Update : rsyslog on SL6.x i386/x86_64

Medium Nessus Plugin ID 61129


The remote Scientific Linux host is missing one or more security updates.


The rsyslog packages provide an enhanced, multi-threaded syslog daemon that supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine grained output format control.

A two byte buffer overflow flaw was found in the rsyslog daemon's parseLegacySyslogMsg function. An attacker able to submit log messages to rsyslogd could use this flaw to crash the daemon. (CVE-2011-3200)

All rsyslog users should upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, the rsyslog daemon will be restarted automatically.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 61129

File Name: sl_20110901_rsyslog_on_SL6_x.nasl

Version: $Revision: 1.3 $

Type: local

Agent: unix

Published: 2012/08/01

Modified: 2015/01/13

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2011/09/01

Reference Information

CVE: CVE-2011-3200