We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-47619

tranport: TLS host name wildcard matching too lax



Description

syslog-ng is an enhanced log daemo. Prior to version 4.8.2, `tls_wildcard_match()` matches on certificates such as `foo.*.bar` although that is not allowed. It is also possible to pass partial wildcards such as `foo.a*c.bar` which glib matches but should be avoided / invalidated. This issue could have an impact on TLS connections, such as in man-in-the-middle situations. Version 4.8.2 contains a fix for the issue.

Reserved 2024-09-27 | Published 2025-05-07 | Updated 2025-05-07 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Problem types

CWE-295: Improper Certificate Validation

Product status

< 4.8.2
affected

References

github.com/...log-ng/security/advisories/GHSA-xr54-gx74-fghg

github.com/...ommit/dadfdbecde5bfe710b0a6ee5699f96926b3f9006

github.com/...fddc0b569a15e7a7d/lib/transport/tls-verifier.c

github.com/syslog-ng/syslog-ng/releases/tag/syslog-ng-4.8.2

cve.org (CVE-2024-47619)

nvd.nist.gov (CVE-2024-47619)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-47619

Support options

Helpdesk Chat, Email, Knowledgebase