Gentoo Logo

ulogd: Remote execution of arbitrary code


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200703-17 / ulogd
Release Date March 18, 2007
Latest Revision March 18, 2007: 01
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
app-admin/ulogd < 1.23-r1 >= 1.23-r1 All supported architectures

Related bugreports: #161882


ulogd contains a possible buffer overflow potentially allowing for the remote execution of arbitrary code.

2.  Impact Information


ulogd is a userspace daemon for netfilter related logging.


SUSE reported unspecified buffer overflows in ulogd involving the calculation of string lengths.


A remote attacker could trigger a possible buffer overflow through unspecified vectors, potentially leading to the remote execution of arbitrary code with the rights of the user running the ulogd daemon, or more probably leading to the crash of the daemon.

3.  Resolution Information


There is no known workaround at this time.


All ulogd users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/ulogd-1.23-r1"

4.  References


Page updated March 18, 2007

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.