7.5
CVSSv2

CVE-2018-1000140

Published: 23/03/2018 Updated: 12/06/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

rsyslog librelp version 1.2.14 and previous versions contains a Buffer Overflow vulnerability in the checking of x509 certificates from a peer that can result in Remote code execution. This attack appear to be exploitable a remote attacker that can connect to rsyslog and trigger a stack buffer overflow by sending a specially crafted x509 certificate.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rsyslog librelp

debian debian linux 8.0

debian debian linux 9.0

canonical ubuntu linux 14.04

redhat enterprise linux desktop 7.0

redhat enterprise linux server aus 7.2

redhat enterprise linux workstation 7.0

redhat enterprise linux server tus 7.2

redhat enterprise linux server 7.0

redhat enterprise linux server aus 6.6

redhat enterprise linux desktop 6.0

redhat enterprise linux server 6.0

redhat enterprise linux workstation 6.0

redhat enterprise linux server tus 7.3

redhat enterprise linux server aus 7.3

redhat enterprise linux server aus 7.4

redhat enterprise linux server eus 7.3

redhat enterprise linux server eus 7.4

redhat enterprise linux server tus 7.4

redhat enterprise linux server eus 7.5

redhat enterprise linux server eus 6.7

redhat enterprise linux server tus 7.6

redhat enterprise linux server eus 7.6

redhat enterprise linux server aus 7.6

redhat enterprise linux server tus 6.6

Vendor Advisories

librelp could be made to crash or run programs if it received specially crafted network traffic ...
Synopsis Critical: librelp security update Type/Severity Security Advisory: Critical Topic An update for librelp is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Critical A Common Vulnerability Scoring System (CVSS) base score, wh ...
Synopsis Critical: librelp security update Type/Severity Security Advisory: Critical Topic An update for librelp is now available for Red Hat Enterprise Linux 72 Advanced Update Support, Red Hat Enterprise Linux 72 Telco Extended Update Support, and Red Hat Enterprise Linux 72 Update Services for SAP Sol ...
Synopsis Critical: librelp security update Type/Severity Security Advisory: Critical Topic An update for librelp is now available for Red Hat Enterprise Linux 73 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Critical A Common Vulnerability Scoring Sy ...
Synopsis Critical: librelp security update Type/Severity Security Advisory: Critical Topic An update for librelp is now available for Red Hat Enterprise Linux 67 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Critical A Common Vulnerability Scoring Sy ...
Synopsis Critical: librelp security update Type/Severity Security Advisory: Critical Topic An update for librelp is now available for Red Hat Enterprise Linux 74 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Critical A Common Vulnerability Scoring Sy ...
Synopsis Critical: librelp security update Type/Severity Security Advisory: Critical Topic An update for librelp is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Critical A Common Vulnerability Scoring System (CVSS) base score, wh ...
Synopsis Critical: librelp security update Type/Severity Security Advisory: Critical Topic An update for librelp is now available for Red Hat Enterprise Linux 66 Advanced Update Support and Red Hat Enterprise Linux 66 Telco Extended Update SupportRed Hat Product Security has rated this update as having a ...
Stack-based buffer overflow in relpTcpChkPeerName function in src/tcpc:rsyslog librelp version 1214 and earlier contains a Buffer Overflow vulnerability in the checking of x509 certificates from a peer that can result in Remote code execution This attack appear to be exploitable a remote attacker that can connect to rsyslog and trigger a stack ...
A stack-based buffer overflow was found in the way librelp parses X509 certificates By connecting or accepting connections from a remote peer, an attacker may use a specially crafted X509 certificate to exploit this flaw and potentially execute arbitrary code ...