[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: Re: [oss-security] CVE Request -- logwatch: Privilege escalation
From: Josh Bressers <bressers () redhat ! com>
Date: 2011-02-24 20:57:41
Message-ID: 1265265450.219398.1298581061714.JavaMail.root () zmail01 ! collab ! prod ! int ! phx2 ! redhat ! com
[Download RAW message or body]
Please use CVE-2011-1018
Thanks.
--
JB
----- Original Message -----
> Hello Josh, Steve, vendors,
>
> a security flaw was found in the way logwatch, a log file
> analysis program, pre-processed log files, containing certain
> special characters in their names. A remote attacker could
> use this flaw to execute arbitrary code with the privileges
> of the privileged system user (root) by creating a
> specially-crafted log file, subsequently analyzed by the
> logwatch script.
>
> Upstream bug report:
> [1]
> http://sourceforge.net/tracker/?func=detail&aid=3184223&group_id=312875&atid=1316824
>
> Related patch:
> [2]
> http://logwatch.svn.sourceforge.net/viewvc/logwatch?view=revision&revision=26
>
> Other references:
> [3]
> http://sourceforge.net/mailarchive/forum.php?thread_name=4D604843.7040303%40mblmail.net&forum_name=logwatch-devel
> [4] https://bugzilla.redhat.com/show_bug.cgi?id=680237
>
> Could you allocate a CVE id for this issue?
>
> Thanks && Regards, Jan.
> --
> Jan iankko Lieskovsky / Red Hat Security Response Team
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic