#VU45295 Input validation error in logwatch - CVE-2011-1018
Published: February 25, 2011 / Updated: August 11, 2020
Vulnerability identifier: #VU45295
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: CVE-2011-1018
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
Public exploit is available
Vulnerable software:
logwatch
logwatch
Software vendor:
www.logwatch.org
www.logwatch.org
Description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
logwatch.pl in Logwatch 7.3.6 allows remote attackers to execute arbitrary commands via shell metacharacters in a log file name, as demonstrated via a crafted username to a Samba server.
Remediation
Install update from vendor's website.
External links
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055579.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055585.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055617.html
- http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
- http://logwatch.svn.sourceforge.net/viewvc/logwatch/scripts/logwatch.pl?r1=3&r2=26&pathrev=26
- http://secunia.com/advisories/43356
- http://secunia.com/advisories/43495
- http://secunia.com/advisories/43622
- http://secunia.com/advisories/43644
- http://secunia.com/advisories/43734
- http://sourceforge.net/mailarchive/forum.php?thread_name=4D604843.7040303%40mblmail.net&forum_name=logwatch-devel
- http://sourceforge.net/tracker/?func=detail&aid=3184223&group_id=312875&atid=1316824
- http://www.debian.org/security/2011/dsa-2182
- http://www.openwall.com/lists/oss-security/2011/02/24/13
- http://www.openwall.com/lists/oss-security/2011/02/24/15
- http://www.redhat.com/support/errata/RHSA-2011-0324.html
- http://www.securityfocus.com/bid/46554
- http://www.securitytracker.com/id?1025165
- http://www.ubuntu.com/usn/USN-1078-1
- http://www.vupen.com/english/advisories/2011/0533
- http://www.vupen.com/english/advisories/2011/0581
- http://www.vupen.com/english/advisories/2011/0596
- https://bugzilla.redhat.com/show_bug.cgi?id=680237