CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-47619: tranport: TLS host name wildcard matching too lax

7.5 CVSS

Description

syslog-ng is an enhanced log daemo. Prior to version 4.8.2, `tls_wildcard_match()` matches on certificates such as `foo.*.bar` although that is not allowed. It is also possible to pass partial wildcards such as `foo.a*c.bar` which glib matches but should be avoided / invalidated. This issue could have an impact on TLS connections, such as in man-in-the-middle situations. Version 4.8.2 contains a fix for the issue.

Classification

CVE ID: CVE-2024-47619

CVSS Base Severity: HIGH

CVSS Base Score: 7.5

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Problem Types

CWE-295: Improper Certificate Validation

Affected Products

Vendor: syslog-ng

Product: syslog-ng

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.02% (probability of being exploited)

EPSS Percentile: 4.43% (scored less or equal to compared to others)

EPSS Date: 2025-06-05 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2024-47619
https://github.com/syslog-ng/syslog-ng/security/advisories/GHSA-xr54-gx74-fghg
https://github.com/syslog-ng/syslog-ng/commit/dadfdbecde5bfe710b0a6ee5699f96926b3f9006
https://github.com/syslog-ng/syslog-ng/blob/b0ccc8952d333fbc2d97e51fddc0b569a15e7a7d/lib/transport/tls-verifier.c#L78-L110
https://github.com/syslog-ng/syslog-ng/releases/tag/syslog-ng-4.8.2

Timeline