Heap based buffer flow in zlog v1.1.0 to v1.2.17 in zlog_rule_new().The size of record_name is MAXLEN_PATH(1024) + 1 but file_path may have data upto MAXLEN_CFG_LINE(MAXLEN_PATH*4) + 1. So a check was missing in zlog_rule_new() while copying the record_name from file_path + 1 which caused the buffer overflow. An attacker can exploit this vulnerability to overwrite the zlog_record_fn record_func function pointer to get arbitrary code execution or potentially cause remote code execution (RCE).

Project Subscriptions

Vendors Products
Zlog Project Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 26 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Zlog Project
Zlog Project zlog
CPEs cpe:2.3:a:zlog_project:zlog:*:*:*:*:*:*:*:*
Vendors & Products Zlog Project
Zlog Project zlog
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 27 Aug 2024 21:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-122
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-27T19:45:25.342Z

Reserved: 2024-01-11T00:00:00.000Z

Link: CVE-2024-22857

cve-icon Vulnrichment

Updated: 2024-08-01T22:51:11.161Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-07T01:15:52.640

Modified: 2024-11-21T08:56:42.987

Link: CVE-2024-22857

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses