Heap based buffer flow in zlog v1.1.0 to v1.2.17 in zlog_rule_new().The size of record_name is MAXLEN_PATH(1024) + 1 but file_path may have data upto MAXLEN_CFG_LINE(MAXLEN_PATH*4) + 1. So a check was missing in zlog_rule_new() while copying the record_name from file_path + 1 which caused the buffer overflow. An attacker can exploit this vulnerability to overwrite the zlog_record_fn record_func function pointer to get arbitrary code execution or potentially cause remote code execution (RCE).
Metrics
Affected Vendors & Products
References
History
Tue, 27 Aug 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-122 | |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-03-07T00:00:00
Updated: 2024-08-27T19:45:25.342Z
Reserved: 2024-01-11T00:00:00
Link: CVE-2024-22857
Vulnrichment
Updated: 2024-08-01T22:51:11.161Z
NVD
Status : Awaiting Analysis
Published: 2024-03-07T01:15:52.640
Modified: 2024-08-27T20:35:09.263
Link: CVE-2024-22857
Redhat
No data.