CVE-2019-17041
📋 TL;DR
CVE-2019-17041 is a critical heap overflow vulnerability in Rsyslog's AIX log message parser that allows remote code execution. Attackers can exploit this by sending specially crafted AIX log messages to trigger memory corruption. Any system running vulnerable Rsyslog versions with the pmaixforwardedfrom module enabled is affected.
💻 Affected Systems
- Rsyslog
📦 What is this software?
Fedora by Fedoraproject
Fedora by Fedoraproject
Leap by Opensuse
Leap by Opensuse
Rsyslog by Rsyslog
⚠️ Risk & Real-World Impact
Worst Case
Remote attacker gains full system control via arbitrary code execution, potentially leading to complete system compromise, data theft, or ransomware deployment.
Likely Case
Remote code execution leading to service disruption, privilege escalation, or installation of backdoors/malware on affected systems.
If Mitigated
With proper network segmentation and exploit prevention controls, impact limited to denial of service or isolated system compromise.
🎯 Exploit Status
Exploit requires sending specially crafted AIX log messages to vulnerable Rsyslog instance. Public PoC available in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v8.1908.1 and later
Vendor Advisory: https://github.com/rsyslog/rsyslog/pull/3884
Restart Required: Yes
Instructions:
1. Update Rsyslog to v8.1908.1 or later using package manager. 2. For Debian/Ubuntu: apt update && apt upgrade rsyslog. 3. For RHEL/CentOS: yum update rsyslog. 4. Restart Rsyslog service: systemctl restart rsyslog
🔧 Temporary Workarounds
Disable pmaixforwardedfrom module
linuxRemove or comment out pmaixforwardedfrom module loading in Rsyslog configuration
sed -i '/pmaixforwardedfrom/d' /etc/rsyslog.conf
sed -i '/module.*pmaixforwardedfrom/d' /etc/rsyslog.d/*.conf
Block external AIX log sources
linuxConfigure firewall to block AIX log messages from untrusted sources
iptables -A INPUT -p tcp --dport 514 -m string --string "AIX" --algo bm -j DROP
iptables -A INPUT -p udp --dport 514 -m string --string "AIX" --algo bm -j DROP
🧯 If You Can't Patch
- Disable pmaixforwardedfrom module immediately in Rsyslog configuration
- Implement strict network segmentation and firewall rules to limit Rsyslog exposure to trusted sources only
🔍 How to Verify
Check if Vulnerable:
Check if pmaixforwardedfrom module is loaded: rsyslogd -N1 | grep pmaixforwardedfrom
Check Version:
rsyslogd -v | head -1
Verify Fix Applied:
Verify Rsyslog version is v8.1908.1 or later and pmaixforwardedfrom module is disabled or patched
📡 Detection & Monitoring
Log Indicators:
- Unusual AIX log messages with malformed format
- Rsyslog process crashes or abnormal restarts
- Memory corruption errors in system logs
Network Indicators:
- AIX log messages from unexpected sources
- High volume of AIX-formatted logs to Rsyslog ports
SIEM Query:
source="rsyslog" AND ("pmaixforwardedfrom" OR "heap overflow" OR "segmentation fault")
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html
- https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog
- https://github.com/rsyslog/rsyslog/pull/3884
- https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html
- https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog
- https://github.com/rsyslog/rsyslog/pull/3884
- https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/