SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   LogWatch Vendors:   Bauer, Kirk
LogWatch Filename Processing Flaw Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1025165
SecurityTracker URL:  http://securitytracker.com/id/1025165
CVE Reference:   CVE-2011-1018   (Links to External Site)
Date:  Mar 7 2011
Impact:   Execution of arbitrary code via network, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): prior to 7.4.0
Description:   A vulnerability was reported in LogWatch. A remote user can execute arbitrary commands on the target system.

The software passes data from log file names to the shell without proper input validation. A remote user can create a specially crafted log file that, when processed via logwatch by the target user, will execute arbitrary commands on the target system with root level privileges.

Impact:   A remote user can create a file that, when processed by the target user, will execute arbitrary code on the target system with root privileges.
Solution:   The vendor has issued a fix (7.4.0).

The vendor's advisory is available at:

http://sourceforge.net/tracker/?func=detail&aid=3184223&group_id=312875&atid=1316824

Vendor URL:  sourceforge.net/projects/logwatch/files/ (Links to External Site)
Cause:   Input validation error
Underlying OS:   Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Mar 7 2011 (Red Hat Issues Fix) LogWatch Filename Processing Flaw Lets Remote Users Execute Arbitrary Code   (bugzilla@redhat.com)
Red Hat has issued a fix for Red Hat Enterprise Linux 5 and 6.



 Source Message Contents

Date:  Mon, 07 Mar 2011 23:09:49 +0000
Subject:  logwatch


http://sourceforge.net/tracker/?func=detail&aid=3184223&group_id=312875&atid=1316824

> special chracters in log file names break logwatch - ID: 3184223

CVE-2011-1018
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC