SuSE Security Announcement - syslogd (a1)

        Package:  syslogd-1.3.33 (a1)
        Date:     Thu Nov 18 14:00:29 CET 1999

        Affected SuSE versions: 6.2 and 6.3
        Vulnerability Type:     local denial-of-service attack
        SuSE default package:   yes
        Other affected systems: all Linux systems using the syslog daemon

A security hole was discovered in the package mentioned above.
Please update as soon as possible or disable the service if you are using
this software on your SuSE Linux installation(s).

Other Linux distributions or operating systems might be affected as
well, please contact your vendor for information about this issue.

Please note, that that we provide this information on an "as-is" basis only.
There is no warranty whatsoever and no liability for any direct, indirect or
incidental damage arising from this information or the installation of
the update package.

1. Problem Description

  The syslogd server uses a Unix Domain stream socket (/dev/log) for receiving
  local log messages via syslog(3).
  Unix Domain stream sockets are non connection-less, that means, that
  one process is needed to serve one client.

2. Impact

  By opening alot of local syslog connections a user could stop the
  system from responding.

3. Solution

  Updated the package from our FTP server.

Please verify these md5 checksums of the updates before installing:

  c9a9e0f8fc4e29daf30f8a735ae333ab  syslogd-1.3.33-9.alpha.rpm  (AXP, 6.1)
  3104e26a8b474e215ed703b7c4d48888  syslogd-1.3.33-9.i386.rpm   (x86, 5.3)
  a13be12a75232f2f62f51fb1cae26fc0  syslogd-1.3.33-9.i386.rpm   (x86, 6.1)
  fc29df9455288f40eb1e8dbd0f47d5b3  syslogd-1.3.33-9.i386.rpm   (x86, 6.2)
  869b7fedd5b52807f12b7f66e282002c  syslogd-1.3.33-9.i386.rpm   (x86, 6.3)

You can find updates on our ftp-Server:


or try the following web pages for a list of mirrors:

Our webpage for patches:

Our webpage for security announcements:

If you want to report vulnerabilities, please contact
  [email protected]