AIX rsyslog Advisory : rsyslog_advisory.asc

High Nessus Plugin ID 79660

Synopsis

The remote AIX host has a vulnerable version of rsyslog.

Description

The version of rsyslog installed on the remote AIX host is affected by a remote code execution or denial of service vulnerability :

- The installed rsyslog allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impacts by crafting a priority (PRI) value that triggers an out-of-bounds array access. (CVE-2014-3634)

- The original fix for the above issue still retained a denial of service vulnerability when large PRI values were encountered. (CVE-2014-3683)

Solution

A fix is available and can be downloaded from the AIX website.

To extract the fixes from the tar file :

tar xvf rsyslog_fix.tar

IMPORTANT : it is recommended that a mksysb backup of the system be created if possible. Verify that it is both bootable and readable before proceeding.

To preview the fix installation :

installp -a -d rsyslog.base -p all

To install the fix package :

installp -a -d rsyslog.base -X all

See Also

http://aix.software.ibm.com/aix/efixes/security/rsyslog_advisory.asc

Plugin Details

Severity: High

ID: 79660

File Name: aix_rsyslog_advisory.nasl

Version: $Revision: 1.3 $

Type: local

Published: 2014/12/02

Modified: 2016/05/19

Dependencies: 12634

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/o:ibm:aix, cpe:/a:rsyslog:rsyslog

Required KB Items: Host/AIX/lslpp, Host/local_checks_enabled, Host/AIX/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/11/14

Vulnerability Publication Date: 2014/09/30

Reference Information

CVE: CVE-2014-3634, CVE-2014-3683

BID: 70187, 70243

OSVDB: 112338, 112596