Heap based buffer flow in zlog v1.1.0 to v1.2.17 in zlog_rule_new().The size of record_name is MAXLEN_PATH(1024) + 1 but file_path may have data upto MAXLEN_CFG_LINE(MAXLEN_PATH*4) + 1. So a check was missing in zlog_rule_new() while copying the record_name from file_path + 1 which caused the buffer overflow. An attacker can exploit this vulnerability to overwrite the zlog_record_fn record_func function pointer to get arbitrary code execution or potentially cause remote code execution (RCE).
History

Tue, 27 Aug 2024 21:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-122
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-03-07T00:00:00

Updated: 2024-08-27T19:45:25.342Z

Reserved: 2024-01-11T00:00:00

Link: CVE-2024-22857

cve-icon Vulnrichment

Updated: 2024-08-01T22:51:11.161Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-07T01:15:52.640

Modified: 2024-08-27T20:35:09.263

Link: CVE-2024-22857

cve-icon Redhat

No data.