发布时间: 2024年10月12日
修改时间: 2024年11月1日
Heap based buffer flow in zlog v1.1.0 to v1.2.17 in zlog_rule_new().The size of record_name is MAXLEN_PATH(1024) + 1 but file_path may have data upto MAXLEN_CFG_LINE(MAXLEN_PATH*4) + 1. So a check was missing in zlog_rule_new() while copying the record_name from file_path + 1 which caused the buffer overflow. An attacker can exploit this vulnerability to overwrite the zlog_record_fn record_func function pointer to get arbitrary code execution or potentially cause remote code execution (RCE).
NVD | openEuler | |
---|---|---|
Confidentiality | High | |
Attack Vector | Network | |
CVSS评分 | N/A | 9.8 |
Attack Complexity | Low | |
Privileges Required | None | |
Scope | Unchanged | |
Integrity | High | |
User Interaction | None | |
Availability | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-4128 | zlog security update | 2024年11月21日 |
KylinSec-SA-2024-4375 | zlog security update | 2024年12月30日 |
KylinSec-SA-2024-5001 | zlog security update | 2025年3月6日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-5 | zlog | Fixed |
KY3.5.2 | zlog | Fixed |
V6 | zlog | Fixed |