Agreed. Unexpected octet counting of rawmsg can also cause other problems. Best 
to disable by default.

Thanks all!


> On May 5, 2022, at 14:04, David Lang <da...@lang.hm> wrote:
> 
> octet counting is an unusual enough use case, I would suggest that distros 
> consider disabling it by default (for new installs, not changing existng 
> installs)
> 
> David Lang
> 
> On Thu, 5 May 2022, John Chivian via rsyslog wrote:
> 
>> Date: Thu, 5 May 2022 13:31:19 -0500
>> From: John Chivian via rsyslog <rsyslog@lists.adiscon.com>
>> To: rsyslog-users <rsyslog@lists.adiscon.com>
>> Cc: John Chivian <jchiv...@chivian.com>
>> Subject: Re: [rsyslog] rsyslog security vulnerability in versions < 8.2204.1
>> Hello Rainer -
>> 
>>  Can you please confirm that the input in the following configuration 
>> snippet is NOT vulnerable…
>> 
>> module(load=“imptcp")
>> input(
>> type="imptcp"
>> name="userdata"
>> port="5140"
>> ruleset="userdata_input"
>> supportoctetcountedframing="no"
>> )
>> 
>> Thanks,
>> 
>> 
>> 
>>> On May 5, 2022, at 07:11, Rainer Gerhards via rsyslog 
>>> <rsyslog@lists.adiscon.com> wrote:
>>> Dear List,
>>> there is heap buffer overflow vulnerability in rsyslog tcp reception
>>> components, most notably imtcp and imptcp. This can only happen in
>>> octet-counted mode, which is enabled by default.
>>> If the receiver ports are exposed to the public Internet AND are used
>>> without authentication, this can lead to remote DoS and potentially to
>>> remote code execution. It is unclear if remote code execution is
>>> actually possible. If so, it needs a very sophisticated attack.
>>> When syslog best practices with proper firewalling and authentication
>>> is used, thean attack can only be carried out from within the Intranet
>>> and authorized systems. This limits the severity of the vulnerability
>>> considerably (it would obviously require an attacker already to be
>>> present inside the internal network).
>>> Advisory: 
>>> https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8#advisory-comment-72243
>>> A patch is available, updated packages are already available or will
>>> be within the next few hours. The daily stable will contain the patch
>>> later today.
>>> Credits to Peter Agten for initially reporting the issue and working
>>> with us on the resolution.
>>> Rainer
>>> _______________________________________________
>>> rsyslog mailing list
>>> https://lists.adiscon.net/mailman/listinfo/rsyslog
>>> http://www.rsyslog.com/professional-services/
>>> What's up with rsyslog? Follow https://twitter.com/rgerhards
>>> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
>>> sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T 
>>> LIKE THAT.
>> 
>> _______________________________________________
>> rsyslog mailing list
>> https://lists.adiscon.net/mailman/listinfo/rsyslog
>> http://www.rsyslog.com/professional-services/
>> What's up with rsyslog? Follow https://twitter.com/rgerhards
>> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
>> sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T 
>> LIKE THAT.

_______________________________________________
rsyslog mailing list
https://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards
NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE 
THAT.

Reply via email to