Family: SuSE Local Security Checks --> Category: infos
SUSE-SA:2002:039: syslog-ng Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the syslog-ng package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory SUSE-SA:2002:039 (syslog-ng).
The syslog-ng package is a portable syslog implementation which can
be used as syslogd replacement.
Syslog-ng contained buffer overflows in its macro expansion routines.
These overflows could be triggered by remote attackers if certain
configuration options were enabled.
Syslog-ng is not used by default on SUSE LINUX, and even if installed,
the problematic options are not enabled by default. We recommend an update
of the syslog-ng package nevertheless if you use syslog-ng for logging.
To be sure the update takes effect you have to restart the daemon
by issuing the following command as root:
We would like to thank Balazs Scheidler for offering fixes for this
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command 'rpm -Fhv file.rpm' to apply
Solution : http://www.suse.de/security/2002_039_syslog_ng.html
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.