10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
logwatch is vulnerable to arbitrary code execution. The vulnerability exists as a flaw was found in the way Logwatch processed log files. If an attacker were able to create a log file with a malicious file name, it could result in arbitrary code execution with the privileges of the root user when that log file is analyzed by Logwatch.
CPE | Name | Operator | Version |
---|---|---|---|
logwatch | eq | 7.3__8.el5 | |
logwatch | eq | 7.3.6__48.1.el6 | |
logwatch | eq | 7.3__6.el5 | |
logwatch | eq | 7.3__8.el5 | |
logwatch | eq | 7.3.6__48.1.el6 | |
logwatch | eq | 7.3__6.el5 |
lists.fedoraproject.org/pipermail/package-announce/2011-March/055579.html
lists.fedoraproject.org/pipermail/package-announce/2011-March/055585.html
lists.fedoraproject.org/pipermail/package-announce/2011-March/055617.html
lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
logwatch.svn.sourceforge.net/viewvc/logwatch/scripts/logwatch.pl?r1=3&r2=26&pathrev=26
secunia.com/advisories/43356
secunia.com/advisories/43495
secunia.com/advisories/43622
secunia.com/advisories/43644
secunia.com/advisories/43734
sourceforge.net/mailarchive/forum.php?thread_name=4D604843.7040303%40mblmail.net&forum_name=logwatch-devel
sourceforge.net/tracker/?func=detail&aid=3184223&group_id=312875&atid=1316824
www.debian.org/security/2011/dsa-2182
www.openwall.com/lists/oss-security/2011/02/24/13
www.openwall.com/lists/oss-security/2011/02/24/15
www.redhat.com/support/errata/RHSA-2011-0324.html
www.securityfocus.com/bid/46554
www.securitytracker.com/id?1025165
www.ubuntu.com/usn/USN-1078-1
www.vupen.com/english/advisories/2011/0533
www.vupen.com/english/advisories/2011/0581
www.vupen.com/english/advisories/2011/0596
access.redhat.com/errata/RHSA-2011:0324
access.redhat.com/security/cve/CVE-2011-1018
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=680237