Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1149081 - (CVE-2014-3683) CVE-2014-3683 rsyslog: integer overflow in PRI parsing
CVE-2014-3683 rsyslog: integer overflow in PRI parsing
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20141002,repo...
: Security
Depends On:
Blocks: 1141341
  Show dependency treegraph
 
Reported: 2014-10-03 03:57 EDT by Tomas Hoger
Modified: 2015-07-31 08:37 EDT (History)
25 users (show)

See Also:
Fixed In Version: rsyslog 7.6.7, rsyslog 8.4.2
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-10-03 07:59:55 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Tomas Hoger 2014-10-03 03:57:44 EDT
An integer overflow flaw was found in the way rsyslog and sysklogd daemons parsed PRI (priority value, that combines values for facility (such as mail, cron, or authpriv) and severity/level (such as crit, info, debug)) values form the log message provided to the syslog daemon.  This problem could lead to bypass of the CVE-2014-3634 (bug 1142373) fix.

The rsyslog upstream fixed this issue in version 7.6.7 and 8.4.2:

http://lists.adiscon.net/pipermail/rsyslog/2014-October/038516.html
http://lists.adiscon.net/pipermail/rsyslog/2014-October/038515.html

A proposed fix for sysklogd is attached in bug 1142373 comment 16.

Acknowledgment:

Red Hat would like to thank the rsyslog upstream for reporting this issue. Upstream acknowledges mancha as the original reporter.

External References:

http://www.rsyslog.com/remote-syslog-pri-vulnerability-cve-2014-3683/
Comment 1 Tomas Hoger 2014-10-03 07:25:44 EDT
Further details of the impact of the original issue CVE-2014-3634 can be found in bug 1142373 comment 20.

This integer overflow may cause f_pmask[] over-read (bug 1142373 comment 21) have worse impact on sysklogd and rsyslog 3.x, making it possible to reliably crash those versions.

The textpri() impact on sysklogd and rsyslog 3.x is unchanged.  In case of rsyslog 5.x and 7.x, this may give an attacker a better control over what memory will be used as facility name or length of the facility name, which may result in easier exploitation of the flaw.
Comment 2 Tomas Hoger 2014-10-03 07:57:33 EDT
While upstream advisory indicates this issue is an incomplete fix of CVE-2014-3634, the real problem was actually introduced by CVE-2014-3634 patches.  Before those patches, there was an overflow in the way PRI value was parsed.  Hence, syslog could use negative PRI value internally.  However, the way facility number was extracted from PRI value using LOG_FAC ensured that the negative facility value was not used.

The issue was corrected upstream via the following commit:

http://git.adiscon.com/?p=rsyslog.git;a=commitdiff;h=8a4ada4

The rsyslog upstream also provided updated patches for 3.x and 5.x that fix CVE-2014-3634 without introducing CVE-2014-3683 - see bug 1142373 comment 13, bug 1142373 comment 14 and bug 1142373 comment 29.
Comment 3 Tomas Hoger 2014-10-03 07:59:55 EDT
Statement:

This issue did not affect the versions of sysklogd and rsyslog packages as shipped with Red Hat Enterprise Linux 5, 6, and7.

Note You need to log in before you can comment on or make changes to this bug.