Description
rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
Published: 2014-11-02
Score: 7.5 High
EPSS: 29.4% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-72-1 rsylog security update
Debian DSA Debian DSA DSA-3040-1 rsyslog security update
Debian DSA Debian DSA DSA-3047-1 rsyslog security update
Ubuntu USN Ubuntu USN USN-2381-1 Rsyslog vulnerabilities
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.15585}

epss

{'score': 0.30554}


Subscriptions

Redhat Enterprise Linux
Rsyslog Rsyslog
Sysklogd Project Sysklogd
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T10:50:18.205Z

Reserved: 2014-05-14T00:00:00.000Z

Link: CVE-2014-3634

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-11-02T00:55:05.923

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-3634

cve-icon Redhat

Severity : Important

Publid Date: 2014-09-30T00:00:00Z

Links: CVE-2014-3634 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses