Vulnerabilities > Oneidentity > Syslog NG > 2.0

DATE CVE VULNERABILITY TITLE RISK
2023-01-23 CVE-2022-38725 Integer Overflow or Wraparound vulnerability in Oneidentity Syslog-Ng and Syslog-Ng Store BOX
An integer overflow in the RFC3164 parser in One Identity syslog-ng 3.0 through 3.37 allows remote attackers to cause a Denial of Service via crafted syslog input that is mishandled by the tcp or network function.
network
low complexity
oneidentity CWE-190
7.5
2020-06-29 CVE-2020-8019 UNIX Symbolic Link (Symlink) Following vulnerability in Oneidentity Syslog-Ng
A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of syslog-ng of SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Module for Legacy Software 12, SUSE Linux Enterprise Point of Sale 11-SP3, SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Linux Enterprise Server for SAP 12-SP1; openSUSE Backports SLE-15-SP1, openSUSE Leap 15.1 allowed local attackers controlling the user news to escalate their privileges to root.
local
low complexity
oneidentity CWE-61
7.2
2011-01-28 CVE-2011-0343 Permissions, Privileges, and Access Controls vulnerability in Oneidentity Syslog-Ng
Balabit syslog-ng 2.0, 3.0, 3.1, 3.2 OSE and PE, when running on FreeBSD or HP-UX, does not properly perform cast operations, which causes syslog-ng to use a default value of -1 to create log files with insecure permissions (07777), which allows local users to read and write to these log files.
6.9
2008-11-17 CVE-2008-5110 Unspecified vulnerability in Oneidentity Syslog-Ng
syslog-ng does not call chdir when it calls chroot, which might allow attackers to escape the intended jail.
network
oneidentity
critical
9.3