Description
Heap based buffer flow in zlog v1.1.0 to v1.2.17 in zlog_rule_new().The size of record_name is MAXLEN_PATH(1024) + 1 but file_path may have data upto MAXLEN_CFG_LINE(MAXLEN_PATH*4) + 1. So a check was missing in zlog_rule_new() while copying the record_name from file_path + 1 which caused the buffer overflow. An attacker can exploit this vulnerability to overwrite the zlog_record_fn record_func function pointer to get arbitrary code execution or potentially cause remote code execution (RCE).
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Thu, 26 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zlog Project
Zlog Project zlog |
|
| CPEs | cpe:2.3:a:zlog_project:zlog:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zlog Project
Zlog Project zlog |
|
| Metrics |
ssvc
|
Tue, 27 Aug 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-122 | |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-27T19:45:25.342Z
Reserved: 2024-01-11T00:00:00.000Z
Link: CVE-2024-22857
Updated: 2024-08-01T22:51:11.161Z
Status : Awaiting Analysis
Published: 2024-03-07T01:15:52.640
Modified: 2024-11-21T08:56:42.987
Link: CVE-2024-22857
No data.
OpenCVE Enrichment
No data.
Weaknesses