← Zuruck zu CVEs
CVE-2018-16881
HIGH7.5
Beschreibung
A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to crash. Versions before 8.27.0 are vulnerable.
CVE Details
CVSS v3.1 Bewertung7.5
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht1/25/2019
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
debian:debian_linuxredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_for_ibm_z_systemsredhat:enterprise_linux_for_power_big_endianredhat:enterprise_linux_for_power_little_endianredhat:enterprise_linux_for_scientific_computingredhat:enterprise_linux_serverredhat:enterprise_linux_workstationredhat:virtualizationredhat:virtualization_hostredhat:virtualization_managerrsyslog:rsyslog
Schwachen (CWE)
CWE-190CWE-190
Referenzen
https://access.redhat.com/errata/RHBA-2019:2501(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2110(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2437(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2439(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16881(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2022/05/msg00028.html(secalert@redhat.com)
https://access.redhat.com/errata/RHBA-2019:2501(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2110(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2437(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2439(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16881(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2022/05/msg00028.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.