CVE-2022-38725
moderate-risk
Published 2023-01-23
An integer overflow in the RFC3164 parser in One Identity syslog-ng 3.0 through 3.37 allows remote attackers to cause a Denial of Service via crafted syslog input that is mishandled by the tcp or network function. syslog-ng Premium Edition 7.0.30 and syslog-ng Store Box 6.10.0 are also affected.
Do I need to act?
~
4.9% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (4)
Syslog-Ng
Syslog-Ng
Syslog-Ng Store Box
Syslog-Ng Store Box
Affected Vendors
References (14)
Third Party Advisory
https://github.com/syslog-ng/syslog-ng/security/advisories/GHSA-7932-4fc6-pvmc
Third Party Advisory
https://lists.balabit.hu/pipermail/syslog-ng/
Third Party Advisory
https://github.com/syslog-ng/syslog-ng/security/advisories/GHSA-7932-4fc6-pvmc
Third Party Advisory
https://lists.balabit.hu/pipermail/syslog-ng/
44
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
8/34 · Low
Exposure
10/34 · Low