Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:24629
HistoryApr 10, 2020 - 12:59 a.m.

Arbitrary Code Execution

2020-04-1000:59:32
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
9

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

logwatch is vulnerable to arbitrary code execution. The vulnerability exists as a flaw was found in the way Logwatch processed log files. If an attacker were able to create a log file with a malicious file name, it could result in arbitrary code execution with the privileges of the root user when that log file is analyzed by Logwatch.

References

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C