Search for vulnerabilities
Vulnerability details: VCID-jn4x-tsp3-aaam
Vulnerability ID VCID-jn4x-tsp3-aaam
Aliases CVE-2011-3200
Summary Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.
Status Published
Exploitability 2.0
Weighted Severity 6.2
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2011:1247
epss 0.15535 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.15535 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.15535 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.15535 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.15535 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.15535 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.15535 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.15535 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.15535 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.15535 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.31159 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.31159 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.31159 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.31159 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.62007 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
epss 0.72118 https://api.first.org/data/v1/epss?cve=CVE-2011-3200
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2011-3200
Reference id Reference type URL
http://git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=1ca6cc236d1dabf1633238b873fb1c057e52f95e
http://git.adiscon.com/?p=rsyslog.git;a=commit;h=1ca6cc236d1dabf1633238b873fb1c057e52f95e
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065837.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065941.html
http://lists.opensuse.org/opensuse-updates/2011-09/msg00013.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3200.json
https://api.first.org/data/v1/epss?cve=CVE-2011-3200
https://bugzilla.redhat.com/show_bug.cgi?id=727644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3200
http://secunia.com/advisories/45922
http://secunia.com/advisories/46027
http://securitytracker.com/id?1026000
http://www.mandriva.com/security/advisories?name=MDVSA-2011:134
http://www.redhat.com/support/errata/RHSA-2011-1247.html
http://www.rsyslog.com/potential-dos-with-malformed-tag/
http://www.securityfocus.com/bid/49413
644611 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=644611
cpe:2.3:a:rsyslog:rsyslog:4.6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.6:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:4.6.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.7:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.2.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.6:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.3.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.7:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.4.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.4.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.4.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.4.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.4.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.6:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.5.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.7:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.6.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.6.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.6.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.6.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.6.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.6.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.6.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.10:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.4:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.5:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.6:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.7:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.8:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.7.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.9:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.8.0:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.8.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.8.1:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.8.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.8.2:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.8.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.8.3:*:*:*:*:*:*:*
cpe:2.3:a:rsyslog:rsyslog:5.8.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.8.4:*:*:*:*:*:*:*
CVE-2011-3200 https://nvd.nist.gov/vuln/detail/CVE-2011-3200
RHSA-2011:1247 https://access.redhat.com/errata/RHSA-2011:1247
USN-1224-1 https://usn.ubuntu.com/1224-1/
Data source Metasploit
Description This module triggers an off-by-two overflow in the rsyslog daemon. This flaw is unlikely to yield code execution but is effective at shutting down a remote log daemon. This bug was introduced in version 4.6.0 and corrected in 4.6.8/5.8.5. Compiler differences may prevent this bug from causing any noticeable result on many systems (RHEL6 is affected).
Note
Stability:
  - crash-service-down
SideEffects: []
Reliability: []
Ransomware campaign use Unknown
Source publication date Sept. 1, 2011
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/dos/syslog/rsyslog_long_tag.rb
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2011-3200
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.96034
EPSS Score 0.15535
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.