syslog-ng
Page content
- Author: voroskoi
- Vulnerable: 2.0.5-1
- Unaffected: 2.0.5-2sayshell1
A vulnerability has been reported in syslog-ng, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to the improper processing of incoming timestamps. This can be exploited to trigger a NULL pointer dereference via a specially crafted message containing a timestamp without a terminating space character.
- Bug Tracker URL: http://bugs.frugalware.org/task/2675