Vulnerabilities > Oneidentity > Syslog NG > 2.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-01-23 | CVE-2022-38725 | Integer Overflow or Wraparound vulnerability in Oneidentity Syslog-Ng and Syslog-Ng Store BOX An integer overflow in the RFC3164 parser in One Identity syslog-ng 3.0 through 3.37 allows remote attackers to cause a Denial of Service via crafted syslog input that is mishandled by the tcp or network function. | 7.5 |
2020-06-29 | CVE-2020-8019 | UNIX Symbolic Link (Symlink) Following vulnerability in Oneidentity Syslog-Ng A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of syslog-ng of SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Module for Legacy Software 12, SUSE Linux Enterprise Point of Sale 11-SP3, SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Linux Enterprise Server for SAP 12-SP1; openSUSE Backports SLE-15-SP1, openSUSE Leap 15.1 allowed local attackers controlling the user news to escalate their privileges to root. | 7.2 |
2011-01-28 | CVE-2011-0343 | Permissions, Privileges, and Access Controls vulnerability in Oneidentity Syslog-Ng Balabit syslog-ng 2.0, 3.0, 3.1, 3.2 OSE and PE, when running on FreeBSD or HP-UX, does not properly perform cast operations, which causes syslog-ng to use a default value of -1 to create log files with insecure permissions (07777), which allows local users to read and write to these log files. | 6.9 |
2008-11-17 | CVE-2008-5110 | Unspecified vulnerability in Oneidentity Syslog-Ng syslog-ng does not call chdir when it calls chroot, which might allow attackers to escape the intended jail. | 9.3 |