Upstream information
Description
The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
| CVSS detail | National Vulnerability Database |
|---|---|
| Base Score | 8.5 |
| Vector | AV:N/AC:L/Au:N/C:N/I:P/A:C |
| Access Vector | Network |
| Access Complexity | Low |
| Authentication | None |
| Confidentiality Impact | None |
| Integrity Impact | Partial |
| Availability Impact | Complete |
SUSE Security Advisories:
- SUSE-SR:2009:001, published Mon, 12 Jan 2009 13:00:00 +0000
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 06:35:39 2013CVE page last modified: Mon Oct 6 18:15:32 2025