Debian Security Advisory
DSA-175-1 syslog-ng -- buffer overflow
- Date Reported:
- 15 Oct 2002
- Affected Packages:
- syslog-ng
- Vulnerable:
- Yes
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 5934.
In Mitre's CVE dictionary: CVE-2002-1200. - More information:
-
Balazs Scheidler discovered a problem in the way syslog-ng handles macro expansion. When a macro is expanded a static length buffer is used accompanied by a counter. However, when constant characters are appended, the counter is not updated properly, leading to incorrect boundary checking. An attacker may be able to use specially crafted log messages inserted via UDP which overflows the buffer.
This problem has been fixed in version 1.5.15-1.1 for the current stable distribution (woody), in version 1.4.0rc3-3.2 for the old stable distribution (potato) and version 1.5.21-1 for the unstable distribution (sid).
We recommend that you upgrade your syslog-ng package immediately.
- Fixed in:
-
Debian GNU/Linux 2.2 (potato)
- Source:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.4.0rc3-3.2.dsc
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.4.0rc3-3.2.diff.gz
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.4.0rc3.orig.tar.gz
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.4.0rc3-3.2.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.4.0rc3-3.2_alpha.deb
- ARM:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.4.0rc3-3.2_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.4.0rc3-3.2_i386.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.4.0rc3-3.2_m68k.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.4.0rc3-3.2_powerpc.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.4.0rc3-3.2_sparc.deb
Debian GNU/Linux 3.0 (woody)
- Source:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.5.15-1.1.dsc
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.5.15-1.1.diff.gz
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.5.15.orig.tar.gz
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.5.15-1.1.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.5.15-1.1_alpha.deb
- ARM:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.5.15-1.1_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.5.15-1.1_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.5.15-1.1_ia64.deb
- HP Precision:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.5.15-1.1_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.5.15-1.1_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.5.15-1.1_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.5.15-1.1_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.5.15-1.1_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.5.15-1.1_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_1.5.15-1.1_sparc.deb
MD5 checksums of the listed files are available in the original advisory.