Search criteria

3 vulnerabilities found for rsyslogd by rsyslog

FKIE_CVE-2005-3074

Vulnerability from fkie_nvd - Published: 2005-09-27 19:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
SQL injection vulnerability in rsyslogd in RSyslog before 1.0.1 and before 1.10.1 allows remote attackers to execute arbitrary SQL commands via crafted syslog messages.
Impacted products
Vendor Product Version
rsyslog rsyslogd *
rsyslog rsyslogd *
rsyslog rsyslogd 0.8.0_stable
rsyslog rsyslogd 0.8.1_stable
rsyslog rsyslogd 0.8.2_stable
rsyslog rsyslogd 0.8.3_stable
rsyslog rsyslogd 0.8.4_stable
rsyslog rsyslogd 0.9.0_stable
rsyslog rsyslogd 0.9.1_stable
rsyslog rsyslogd 0.9.2_stable
rsyslog rsyslogd 0.9.3_stable
rsyslog rsyslogd 0.9.4_stable
rsyslog rsyslogd 0.9.5_stable
rsyslog rsyslogd 0.9.6_stable
rsyslog rsyslogd 0.9.7_stable
rsyslog rsyslogd 0.9.8_stable
rsyslog rsyslogd 1.0.0_stable

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rsyslog:rsyslogd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "704E4B17-DEC5-4BBB-AD88-436309F308B0",
              "versionEndIncluding": "1.0.1_stable",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rsyslog:rsyslogd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "327A1C97-DCDF-4C5B-802A-D428AF71048C",
              "versionEndIncluding": "1.10.1_development",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rsyslog:rsyslogd:0.8.0_stable:*:*:*:*:*:*:*",
              "matchCriteriaId": "10972C30-E2E7-44A1-AD77-6089C4B3DC66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rsyslog:rsyslogd:0.8.1_stable:*:*:*:*:*:*:*",
              "matchCriteriaId": "F790335E-0251-40E0-8733-FE292E0F46F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rsyslog:rsyslogd:0.8.2_stable:*:*:*:*:*:*:*",
              "matchCriteriaId": "0225F1DA-A546-49F9-BB74-9C16495C735A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rsyslog:rsyslogd:0.8.3_stable:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCC7AC67-3E04-411A-A56F-FE228906285C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rsyslog:rsyslogd:0.8.4_stable:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0456DCB-8D6E-43B4-A3C9-E742CF6062A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rsyslog:rsyslogd:0.9.0_stable:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD71DF4B-FB43-4DFC-B1E6-3D88885A3E50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rsyslog:rsyslogd:0.9.1_stable:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9ED1573-D871-489E-BA95-3C9366E42844",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rsyslog:rsyslogd:0.9.2_stable:*:*:*:*:*:*:*",
              "matchCriteriaId": "75D36B48-D5E2-4FB1-9281-E2701052B3A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rsyslog:rsyslogd:0.9.3_stable:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B16A75D-4D20-43C8-9EE5-D7FCE1571B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rsyslog:rsyslogd:0.9.4_stable:*:*:*:*:*:*:*",
              "matchCriteriaId": "7452394A-731E-473D-AD8C-369D9ADC9122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rsyslog:rsyslogd:0.9.5_stable:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4A28917-C43A-4A10-BFE2-F3D602660D80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rsyslog:rsyslogd:0.9.6_stable:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E09137-34B5-4674-8FB3-25114A13E569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rsyslog:rsyslogd:0.9.7_stable:*:*:*:*:*:*:*",
              "matchCriteriaId": "92CD7FE3-F6D0-4B89-BF77-EA9CEB001D26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rsyslog:rsyslogd:0.9.8_stable:*:*:*:*:*:*:*",
              "matchCriteriaId": "350E596D-D26A-40A5-B3EF-700270F174C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rsyslog:rsyslogd:1.0.0_stable:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6457AEF-3CA8-4F03-AC40-68B6B827DC93",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in rsyslogd in RSyslog before 1.0.1 and before 1.10.1 allows remote attackers to execute arbitrary SQL commands via crafted syslog messages."
    }
  ],
  "id": "CVE-2005-3074",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-09-27T19:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://secunia.com/advisories/16947"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.rsyslog.com/Article35.phtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://secunia.com/advisories/16947"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.rsyslog.com/Article35.phtml"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2005-3074 (GCVE-0-2005-3074)

Vulnerability from cvelistv5 – Published: 2005-09-27 04:00 – Updated: 2024-09-16 18:45
VLAI?
Summary
SQL injection vulnerability in rsyslogd in RSyslog before 1.0.1 and before 1.10.1 allows remote attackers to execute arbitrary SQL commands via crafted syslog messages.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/16947 third-party-advisoryx_refsource_SECUNIA
http://www.rsyslog.com/Article35.phtml x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:01:57.707Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "16947",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16947"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.rsyslog.com/Article35.phtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in rsyslogd in RSyslog before 1.0.1 and before 1.10.1 allows remote attackers to execute arbitrary SQL commands via crafted syslog messages."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-09-27T04:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "16947",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16947"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.rsyslog.com/Article35.phtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3074",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in rsyslogd in RSyslog before 1.0.1 and before 1.10.1 allows remote attackers to execute arbitrary SQL commands via crafted syslog messages."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "16947",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16947"
            },
            {
              "name": "http://www.rsyslog.com/Article35.phtml",
              "refsource": "CONFIRM",
              "url": "http://www.rsyslog.com/Article35.phtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3074",
    "datePublished": "2005-09-27T04:00:00Z",
    "dateReserved": "2005-09-27T00:00:00Z",
    "dateUpdated": "2024-09-16T18:45:20.695Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-3074 (GCVE-0-2005-3074)

Vulnerability from nvd – Published: 2005-09-27 04:00 – Updated: 2024-09-16 18:45
VLAI?
Summary
SQL injection vulnerability in rsyslogd in RSyslog before 1.0.1 and before 1.10.1 allows remote attackers to execute arbitrary SQL commands via crafted syslog messages.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/16947 third-party-advisoryx_refsource_SECUNIA
http://www.rsyslog.com/Article35.phtml x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:01:57.707Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "16947",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16947"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.rsyslog.com/Article35.phtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in rsyslogd in RSyslog before 1.0.1 and before 1.10.1 allows remote attackers to execute arbitrary SQL commands via crafted syslog messages."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-09-27T04:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "16947",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16947"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.rsyslog.com/Article35.phtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3074",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in rsyslogd in RSyslog before 1.0.1 and before 1.10.1 allows remote attackers to execute arbitrary SQL commands via crafted syslog messages."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "16947",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16947"
            },
            {
              "name": "http://www.rsyslog.com/Article35.phtml",
              "refsource": "CONFIRM",
              "url": "http://www.rsyslog.com/Article35.phtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3074",
    "datePublished": "2005-09-27T04:00:00Z",
    "dateReserved": "2005-09-27T00:00:00Z",
    "dateUpdated": "2024-09-16T18:45:20.695Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}