发布时间: 2024年10月12日
修改时间: 2024年11月1日
Heap based buffer flow in zlog v1.1.0 to v1.2.17 in zlog_rule_new().The size of record_name is MAXLEN_PATH(1024) + 1 but file_path may have data upto MAXLEN_CFG_LINE(MAXLEN_PATH*4) + 1. So a check was missing in zlog_rule_new() while copying the record_name from file_path + 1 which caused the buffer overflow. An attacker can exploit this vulnerability to overwrite the zlog_record_fn record_func function pointer to get arbitrary code execution or potentially cause remote code execution (RCE).
NVD | openEuler | |
---|---|---|
CVSS评分 | 9.8 | 9.8 |
Attack Vector | Network | Network |
Attack Complexity | Low | Low |
Privileges Required | None | None |
User Interaction | None | None |
Scope | Unchanged | Unchanged |
Confidentiality | High | High |
Integrity | High | High |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-4128 | zlog security update | 2024年10月12日 |
KylinSec-SA-2024-4375 | zlog security update | 2024年10月12日 |
KylinSec-SA-2024-5001 | zlog security update | 2024年11月1日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-5A | zlog | Fixed |
KY3.5.2 | zlog | Fixed |
V6 | zlog | Fixed |