Heap based buffer flow in zlog v1.1.0 to v1.2.17 in zlog_rule_new().The size of record_name is MAXLEN_PATH(1024) + 1 but file_path may have data upto MAXLEN_CFG_LINE(MAXLEN_PATH*4) + 1. So a check was missing in zlog_rule_new() while copying the record_name from file_path + 1 which caused the buffer overflow. An attacker can exploit this vulnerability to overwrite the zlog_record_fn record_func function pointer to get arbitrary code execution or potentially cause remote code execution (RCE).
Metrics
Affected Vendors & Products
References
History
Thu, 26 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zlog Project
Zlog Project zlog |
|
| CPEs | cpe:2.3:a:zlog_project:zlog:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zlog Project
Zlog Project zlog |
|
| Metrics |
ssvc
|
Tue, 27 Aug 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-122 | |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published: 2024-03-07T00:00:00.000Z
Updated: 2024-08-27T19:45:25.342Z
Reserved: 2024-01-11T00:00:00.000Z
Link: CVE-2024-22857
Updated: 2024-08-01T22:51:11.161Z
Status : Awaiting Analysis
Published: 2024-03-07T01:15:52.640
Modified: 2024-11-21T08:56:42.987
Link: CVE-2024-22857
No data.