CVE-2011-3200
Summary
| CVE | CVE-2011-3200 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2011-09-06 16:55:10 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
NoneIntegrity
NoneAvailability
PartialAV:N/AC:L/Au:N/C:N/I:N/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Rsyslog | Rsyslog | 4.6.0 | All | All | All |
| Application | Rsyslog | Rsyslog | 4.6.1 | All | All | All |
| Application | Rsyslog | Rsyslog | 4.6.2 | All | All | All |
| Application | Rsyslog | Rsyslog | 4.6.3 | All | All | All |
| Application | Rsyslog | Rsyslog | 4.6.4 | All | All | All |
| Application | Rsyslog | Rsyslog | 4.6.5 | All | All | All |
| Application | Rsyslog | Rsyslog | 4.6.6 | All | All | All |
| Application | Rsyslog | Rsyslog | 4.6.7 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.2.0 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.2.1 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.2.2 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.3.1 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.3.2 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.3.3 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.3.4 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.3.5 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.3.6 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.3.7 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.4.0 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.4.1 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.4.2 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.5.0 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.5.1 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.5.2 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.5.3 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.5.4 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.5.5 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.5.6 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.5.7 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.6.0 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.6.1 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.6.2 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.6.3 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.6.4 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.6.5 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.7.0 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.7.1 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.7.10 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.7.2 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.7.3 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.7.4 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.7.5 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.7.6 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.7.7 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.7.8 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.7.9 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.8.0 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.8.1 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.8.2 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.8.3 | All | All | All |
| Application | Rsyslog | Rsyslog | 5.8.4 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| openSUSE-SU-2011:1020-1: moderate: rsyslog | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| RSyslog 'parseLegacySyslogMsg()' Function Buffer Overflow Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| [SECURITY] Fedora 14 Update: rsyslog-4.6.3-3.fc14 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Bug 727644 – CVE-2011-3200 rsyslog: parseLegacySyslogMsg off-by-two buffer overflow | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.redhat.com | Patch |
| Potential DoS with malformed TAG rsyslog | af854a3a-2127-422b-91ae-364da2661108 | www.rsyslog.com | Patch, Vendor Advisory |
| SUSE update for rsyslog - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Fedora update for rsyslog - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| rsyslog TAG Buffer Overflow Lets Remote or Local Users Deny Service - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | |
| [SECURITY] Fedora 16 Update: rsyslog-5.8.5-1.fc16 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| git.adiscon.com | af854a3a-2127-422b-91ae-364da2661108 | git.adiscon.com | |
| Support / Security / Advisories / / MDVSA-2011:134 | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| CONFIRM:http://git.adiscon.com/?p=rsyslog.git;a=commit;h=1ca6cc236d1dabf1633238b873fb1c057e52f95e | MITRE | git.adiscon.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.