syslog-ng

Page content
  • Author: voroskoi
  • Vulnerable: 2.0.5-1
  • Unaffected: 2.0.5-2sayshell1

A vulnerability has been reported in syslog-ng, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to the improper processing of incoming timestamps. This can be exploited to trigger a NULL pointer dereference via a specially crafted message containing a timestamp without a terminating space character.

CVEs: