CVE-2013-4758
Summary
| CVE | CVE-2013-4758 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2013-10-04 17:55:09 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:M/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Rsyslog | Rsyslog | 6.4.2 | All | All | All |
| Application | Rsyslog | Rsyslog | 6.5.1 | All | All | All |
| Application | Rsyslog | Rsyslog | 6.6.0 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.1.0 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.1.1 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.1.10 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.1.11 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.1.12 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.1.2 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.1.3 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.1.4 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.1.5 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.1.6 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.1.7 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.1.8 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.1.9 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.2.1 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.2.2 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.2.3 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.2.4 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.2.5 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.2.6 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.2.7 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.3.0 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.3.1 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.3.10 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.3.11 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.3.12 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.3.13 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.3.14 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.3.15 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.3.3 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.3.4 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.3.5 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.3.6 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.3.7 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.3.8 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.3.9 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.4.0 | All | All | All |
| Application | Rsyslog | Rsyslog | 7.5.0 | devel | All | All |
| Application | Rsyslog | Rsyslog | All | All | All | All |
| Application | Rsyslog | Rsyslog | All | devel | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| rsyslog 7.5.2 (v7-devel) released rsyslog | af854a3a-2127-422b-91ae-364da2661108 | www.rsyslog.com | Patch |
| oss-security - LSE Leading Security Experts GmbH - LSE-2013-07-03 - rsyslog ElasticSearch Plugin | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| rsyslog 7.4.2 (v7-stable) released rsyslog | af854a3a-2127-422b-91ae-364da2661108 | www.rsyslog.com | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.