{"id":"CVE-2022-38725","details":"An integer overflow in the RFC3164 parser in One Identity syslog-ng 3.0 through 3.37 allows remote attackers to cause a Denial of Service via crafted syslog input that is mishandled by the tcp or network function. syslog-ng Premium Edition 7.0.30 and syslog-ng Store Box 6.10.0 are also affected.","modified":"2026-04-11T12:40:57.842223Z","published":"2023-01-23T16:15:10.567Z","related":["GHSA-7932-4fc6-pvmc","SUSE-SU-2023:0319-1","openSUSE-SU-2023:0040-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:a:oneidentity:syslog-ng:*:*:*:*:premium:*:*:*","source":"CPE_FIELD","extracted_events":[{"fixed":"7.0.32"}]},{"cpe":"cpe:2.3:a:oneidentity:syslog-ng_store_box:*:*:*:*:-:*:*:*","source":"CPE_FIELD","extracted_events":[{"fixed":"6.0.5"}]},{"cpe":"cpe:2.3:a:oneidentity:syslog-ng_store_box:*:*:*:*:lts:*:*:*","source":"CPE_FIELD","extracted_events":[{"fixed":"7.0"}]}]},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00043.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3TZ7U2GQTAHVHJXSSEHQS5D2Q5T6SZB/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QU36HCM3VZYANUYFC6XFYEYJEKQPA2Q7/"},{"type":"ADVISORY","url":"https://github.com/syslog-ng/syslog-ng/security/advisories/GHSA-7932-4fc6-pvmc"},{"type":"ADVISORY","url":"https://lists.balabit.hu/pipermail/syslog-ng/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202305-09"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5369"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/syslog-ng/syslog-ng","events":[{"introduced":"0"},{"fixed":"7a087facda3640096a350986aa201a3eca8e0108"}],"database_specific":{"cpe":"cpe:2.3:a:oneidentity:syslog-ng:*:*:*:*:-:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"3.38.1"}]}}],"versions":["pe-5.0-base","syslog-ng-3.10.1","syslog-ng-3.11.1","syslog-ng-3.12.1","syslog-ng-3.13.1","syslog-ng-3.13.2","syslog-ng-3.14.1","syslog-ng-3.15.1","syslog-ng-3.16.1","syslog-ng-3.17.1","syslog-ng-3.17.2","syslog-ng-3.18.1","syslog-ng-3.19.1","syslog-ng-3.20.1","syslog-ng-3.21.1","syslog-ng-3.22.1","syslog-ng-3.23.1","syslog-ng-3.24.1","syslog-ng-3.25.1","syslog-ng-3.26.1","syslog-ng-3.27.1","syslog-ng-3.28.1","syslog-ng-3.29.1","syslog-ng-3.30.1","syslog-ng-3.31.1","syslog-ng-3.31.2","syslog-ng-3.32.1","syslog-ng-3.33.1","syslog-ng-3.33.2","syslog-ng-3.34.1","syslog-ng-3.35.1","syslog-ng-3.36.1","syslog-ng-3.37.1","syslog-ng-3.6.0alpha1","syslog-ng-3.6.0alpha2","syslog-ng-3.6.0alpha3","syslog-ng-3.6.0beta1","syslog-ng-3.6.0beta2","syslog-ng-3.6.0rc1","syslog-ng-3.6.0rc2","syslog-ng-3.6.1","syslog-ng-3.7.0alpha1","syslog-ng-3.7.0alpha2","syslog-ng-3.7.0beta1","syslog-ng-3.7.0beta2","syslog-ng-3.7.1","syslog-ng-3.7.2","syslog-ng-3.8.0beta1","syslog-ng-3.8.0beta2","syslog-ng-3.8.1","syslog-ng-3.9.1","v2.1.1","v2.1alpha1","v2.1beta1","v2.1beta2","v3.0.1","v3.0.2","v3.1.0","v3.1beta1","v3.1beta2","v3.2alpha1","v3.2beta1","v3.3.0alpha1","v3.3.0alpha2","v3.4.0alpha1","v3.4.0alpha2","v3.4.0alpha3","v3.4.0beta1","v3.4.0rc1","v3.4.0rc2","v3.5.0_rc1","v3.5.0beta1","v3.5.0beta2","v3.5.0beta3","v3.5.0rc1","v3.5.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-38725.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}