{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T19:36:11.108","vulnerabilities":[{"cve":{"id":"CVE-2011-1489","sourceIdentifier":"secalert@redhat.com","published":"2019-11-14T02:15:10.797","lastModified":"2024-11-21T01:26:25.820","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages were logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset."},{"lang":"es","value":"Se encontró una pérdida de memoria en rsyslog versiones anteriores a la versión  5.7.6, en la manera en que son registrados los mensajes de log procesados ??en el demonio cuando múltiples conjuntos de reglas fueron usadas y algunos lotes de salida contenían mensajes que pertenecían a más de un conjunto de reglas. Un atacante local podría causar una denegación de servicio del demonio de rsyslogd mediante un mensaje de registro que pertenece a más de un conjunto de reglas."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L\/AC:L\/Au:N\/C:N\/I:N\/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-772"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*","versionEndExcluding":"5.7.6","matchCriteriaId":"22CBAD75-300B-4E25-B694-292C911A02E8"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","matchCriteriaId":"DE554781-1EB9-446E-911F-6C11970C47F4"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","matchCriteriaId":"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","matchCriteriaId":"DEECE5FC-CACF-4496-A3E7-164736409252"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","matchCriteriaId":"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"}]}]}],"references":[{"url":"http:\/\/lists.opensuse.org\/opensuse-security-announce\/2011-04\/msg00005.html","source":"secalert@redhat.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https:\/\/access.redhat.com\/security\/cve\/cve-2011-1489","source":"secalert@redhat.com","tags":["Exploit","Patch","Third Party Advisory"]},{"url":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=CVE-2011-1489","source":"secalert@redhat.com","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https:\/\/github.com\/rsyslog\/rsyslog\/commit\/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a","source":"secalert@redhat.com","tags":["Patch","Third Party Advisory"]},{"url":"https:\/\/security-tracker.debian.org\/tracker\/CVE-2011-1489","source":"secalert@redhat.com","tags":["Third Party Advisory"]},{"url":"http:\/\/lists.opensuse.org\/opensuse-security-announce\/2011-04\/msg00005.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https:\/\/access.redhat.com\/security\/cve\/cve-2011-1489","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Third Party Advisory"]},{"url":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=CVE-2011-1489","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https:\/\/github.com\/rsyslog\/rsyslog\/commit\/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https:\/\/security-tracker.debian.org\/tracker\/CVE-2011-1489","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}