ELOG 3.1.4-57bea22 and below is affected by a denial of service vulnerability due to a NULL pointer dereference. A remote unauthenticated attacker can crash the ELOG server by sending a crafted HTTP GET request.
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Elog | Elog_project | * | 3.1.4-57bea22 (including) |
Elog | Ubuntu | bionic | * |
Elog | Ubuntu | disco | * |
Elog | Ubuntu | eoan | * |
Elog | Ubuntu | groovy | * |
Elog | Ubuntu | hirsute | * |
Elog | Ubuntu | impish | * |
Elog | Ubuntu | trusty | * |
Elog | Ubuntu | xenial | * |