OSSEC 2.9.0 Beta 06

CPE Details

OSSEC 2.9.0 Beta 06
2.9.0
2020-02-03
11h54 +00:00
2020-02-03
11h54 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:ossec:ossec:2.9.0:beta06:*:*:*:*:*:*

Informations

Vendor

ossec

Product

ossec

Version

2.9.0

Update

beta06

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-8442 2020-01-29 23h34 +00:00 In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a heap-based buffer overflow in the rootcheck decoder component via an authenticated client.
8.8
Haute
CVE-2020-8443 2020-01-29 23h34 +00:00 In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to an off-by-one heap-based buffer overflow during the cleaning of crafted syslog msgs (received from authenticated remote agents and delivered to the analysisd processing queue by ossec-remoted).
9.8
Critique
CVE-2020-8444 2020-01-29 23h33 +00:00 In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a use-after-free during processing of ossec-alert formatted msgs (received from authenticated remote agents and delivered to the analysisd processing queue by ossec-remoted).
9.8
Critique
CVE-2020-8445 2020-01-29 23h33 +00:00 In OSSEC-HIDS 2.7 through 3.5.0, the OS_CleanMSG function in ossec-analysisd doesn't remove or encode terminal control characters or newlines from processed log messages. In many cases, those characters are later logged. Because newlines (\n) are permitted in messages processed by ossec-analysisd, it may be possible to inject nested events into the ossec log. Use of terminal control characters may allow obfuscating events or executing commands when viewed through vulnerable terminal emulators. This may be an unauthenticated remote attack for certain types and origins of logged data.
9.8
Critique
CVE-2020-8446 2020-01-29 23h33 +00:00 In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to path traversal (with write access) via crafted syscheck messages written directly to the analysisd UNIX domain socket by a local user.
5.5
Moyen
CVE-2020-8447 2020-01-29 23h33 +00:00 In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a use-after-free during processing of syscheck formatted msgs (received from authenticated remote agents and delivered to the analysisd processing queue by ossec-remoted).
9.8
Critique
CVE-2020-8448 2020-01-29 23h32 +00:00 In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a denial of service (NULL pointer dereference) via crafted messages written directly to the analysisd UNIX domain socket by a local user.
5.5
Moyen
CVE-2018-19666 2018-11-29 07h00 +00:00 The agent in OSSEC through 3.1.0 on Windows allows local users to gain NT AUTHORITY\SYSTEM access via Directory Traversal by leveraging full access to the associated OSSEC server.
7.8
Haute