SB2011033101 - Multiple vulnerabilities in logrotate
Published: March 31, 2011 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 vulnerabilities.
1) Race condition (CVE-ID: CVE-2011-1098)
CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVSSv4: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and earlier allows local users to read log data by opening a file before the intended permissions are in place.
2) Input validation error (CVE-ID: CVE-2011-1154)
CWE-ID: CWE-20 - Improper input validation
CVSSv4: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
3) Resource management error (CVE-ID: CVE-2011-1155)
CWE-ID: CWE-399 - Resource Management Errors
CVSSv4: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The writeState function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to cause a denial of service (rotation outage) via a (1) (newline) or (2) (backslash) character in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
Remediation
Install update from vendor's website.
References
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057845.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056992.html
- http://openwall.com/lists/oss-security/2011/03/04/16
- http://openwall.com/lists/oss-security/2011/03/04/17
- http://openwall.com/lists/oss-security/2011/03/04/18
- http://openwall.com/lists/oss-security/2011/03/04/19
- http://openwall.com/lists/oss-security/2011/03/04/22
- http://openwall.com/lists/oss-security/2011/03/04/24
- http://openwall.com/lists/oss-security/2011/03/04/25
- http://openwall.com/lists/oss-security/2011/03/04/26
- http://openwall.com/lists/oss-security/2011/03/04/27
- http://openwall.com/lists/oss-security/2011/03/04/28
- http://openwall.com/lists/oss-security/2011/03/04/29
- http://openwall.com/lists/oss-security/2011/03/04/30
- http://openwall.com/lists/oss-security/2011/03/04/31
- http://openwall.com/lists/oss-security/2011/03/04/32
- http://openwall.com/lists/oss-security/2011/03/04/33
- http://openwall.com/lists/oss-security/2011/03/05/4
- http://openwall.com/lists/oss-security/2011/03/05/6
- http://openwall.com/lists/oss-security/2011/03/05/8
- http://openwall.com/lists/oss-security/2011/03/06/3
- http://openwall.com/lists/oss-security/2011/03/06/4
- http://openwall.com/lists/oss-security/2011/03/06/5
- http://openwall.com/lists/oss-security/2011/03/06/6
- http://openwall.com/lists/oss-security/2011/03/07/11
- http://openwall.com/lists/oss-security/2011/03/07/5
- http://openwall.com/lists/oss-security/2011/03/07/6
- http://openwall.com/lists/oss-security/2011/03/08/5
- http://openwall.com/lists/oss-security/2011/03/10/2
- http://openwall.com/lists/oss-security/2011/03/10/3
- http://openwall.com/lists/oss-security/2011/03/10/6
- http://openwall.com/lists/oss-security/2011/03/10/7
- http://openwall.com/lists/oss-security/2011/03/11/3
- http://openwall.com/lists/oss-security/2011/03/11/5
- http://openwall.com/lists/oss-security/2011/03/14/26
- http://openwall.com/lists/oss-security/2011/03/23/11
- http://secunia.com/advisories/43955
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:065
- http://www.redhat.com/support/errata/RHSA-2011-0407.html
- http://www.vupen.com/english/advisories/2011/0791
- http://www.vupen.com/english/advisories/2011/0872
- http://www.vupen.com/english/advisories/2011/0961
- https://bugzilla.redhat.com/show_bug.cgi?id=680798
- https://bugzilla.redhat.com/show_bug.cgi?id=680796
- https://bugzilla.redhat.com/show_bug.cgi?id=680797