{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-47619","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-09-27T20:37:22.121Z","datePublished":"2025-05-07T15:12:02.118Z","dateUpdated":"2025-05-28T10:03:45.900Z"},"containers":{"cna":{"title":"tranport: TLS host name wildcard matching too lax","problemTypes":[{"descriptions":[{"cweId":"CWE-295","lang":"en","description":"CWE-295: Improper Certificate Validation","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/syslog-ng/syslog-ng/security/advisories/GHSA-xr54-gx74-fghg","tags":["x_refsource_CONFIRM"],"url":"https://github.com/syslog-ng/syslog-ng/security/advisories/GHSA-xr54-gx74-fghg"},{"name":"https://github.com/syslog-ng/syslog-ng/commit/dadfdbecde5bfe710b0a6ee5699f96926b3f9006","tags":["x_refsource_MISC"],"url":"https://github.com/syslog-ng/syslog-ng/commit/dadfdbecde5bfe710b0a6ee5699f96926b3f9006"},{"name":"https://github.com/syslog-ng/syslog-ng/blob/b0ccc8952d333fbc2d97e51fddc0b569a15e7a7d/lib/transport/tls-verifier.c#L78-L110","tags":["x_refsource_MISC"],"url":"https://github.com/syslog-ng/syslog-ng/blob/b0ccc8952d333fbc2d97e51fddc0b569a15e7a7d/lib/transport/tls-verifier.c#L78-L110"},{"name":"https://github.com/syslog-ng/syslog-ng/releases/tag/syslog-ng-4.8.2","tags":["x_refsource_MISC"],"url":"https://github.com/syslog-ng/syslog-ng/releases/tag/syslog-ng-4.8.2"}],"affected":[{"vendor":"syslog-ng","product":"syslog-ng","versions":[{"version":"< 4.8.2","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-05-07T15:12:02.118Z"},"descriptions":[{"lang":"en","value":"syslog-ng is an enhanced log daemo. Prior to version 4.8.2, `tls_wildcard_match()` matches on certificates such as `foo.*.bar` although that is not allowed. It is also possible to pass partial wildcards such as `foo.a*c.bar` which glib matches but should be avoided / invalidated. This issue could have an impact on TLS connections, such as in man-in-the-middle situations. Version 4.8.2 contains a fix for the issue."}],"source":{"advisory":"GHSA-xr54-gx74-fghg","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/syslog-ng/syslog-ng/security/advisories/GHSA-xr54-gx74-fghg","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-07T17:22:10.473286Z","id":"CVE-2024-47619","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-07T17:22:27.218Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00034.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-05-28T10:03:45.900Z"}}]}}