Heap based buffer flow in zlog v1.1.0 to v1.2.17 in zlog_rule_new().The size of record_name is MAXLEN_PATH(1024) + 1 but file_path may have data upto MAXLEN_CFG_LINE(MAXLEN_PATH*4) + 1. So a check was missing in zlog_rule_new() while copying the record_name from file_path + 1 which caused the buffer overflow. An attacker can exploit this vulnerability to overwrite the zlog_record_fn record_func function pointer to get arbitrary code execution or potentially cause remote code execution (RCE).
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 27 Aug 2024 21:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-122
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-27T19:45:25.342Z

Reserved: 2024-01-11T00:00:00

Link: CVE-2024-22857

cve-icon Vulnrichment

Updated: 2024-08-01T22:51:11.161Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-07T01:15:52.640

Modified: 2024-11-21T08:56:42.987

Link: CVE-2024-22857

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.