Debian Security Advisory
DSA-1464-1 syslog-ng -- null pointer dereference
- Date Reported:
- 15 Jan 2008
- Affected Packages:
- syslog-ng
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2007-6437.
- More information:
-
Oriol Carreras discovered that syslog-ng, a next generation logging daemon can be tricked into dereferencing a NULL pointer through malformed timestamps, which can lead to denial of service and the disguise of an subsequent attack, which would otherwise be logged.
The old stable distribution (sarge) is not affected.
For the stable distribution (etch), this problem has been fixed in version 2.0.0-1etch1.
For the unstable distribution (sid), this problem has been fixed in version 2.0.6-1.
We recommend that you upgrade your syslog-ng package.
- Fixed in:
-
Debian GNU/Linux 4.0 (stable)
- Source:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1.dsc
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0.orig.tar.gz
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1.diff.gz
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0.orig.tar.gz
- Alpha:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_arm.deb
- HP Precision:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_ia64.deb
- Big-endian MIPS:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_mips.deb
- Little-endian MIPS:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/s/syslog-ng/syslog-ng_2.0.0-1etch1_sparc.deb
MD5 checksums of the listed files are available in the original advisory.