Two vulnerabilities were identified in ELOG, which could be exploited by remote attackers to execute arbitrary commands or cause a denial of service.
The first issue is due to a format string error in the "write_logfile()" [elogd.c] function that does not properly handle a specially crafted username, which could be exploited by unauthenticated remote attackers to crash or compromise a vulnerable system.
The second vulnerability is due to an input validation error when processing specially crafted HTTP requests containing directory traversal sequences, which could be exploited by remote attackers to disclose the contents of arbitrary files present on a vulnerable system.
The third vulnerability is due to an error in the "elogd.c" file that does not properly handle overly long revision attributes, which could be exploited by attackers to cause a denial of service.
The fourth issue is due to a buffer overflow error in "elogd.c" when writing to the log file, which could be exploited by attackers to execute arbitrary commands or cause a denial of service.
The fifth flaw is due to a design error where the application displays different error messages for invalid passwords and invalid users, which could allow an attacker to probe for valid user names.
The sixth vulnerability is due to an infinite redirection error in "elogd.c" when handling the "fail" parameter, which could be exploited by attackers to cause a denial of service.
|