Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 24 Feb 2011 20:52:31 +0100
From: Jan Lieskovsky <>
To: "Steven M. Christey" <>
CC: oss-security <>,
        Mike Tremaine <>, Karel Klic <>
Subject: CVE Request -- logwatch: Privilege escalation due improper sanitization
 of special characters in log file names

Hello Josh, Steve, vendors,

   a security flaw was found in the way logwatch, a log file
   analysis program, pre-processed log files, containing certain
   special characters in their names. A remote attacker could
   use this flaw to execute arbitrary code with the privileges
   of the privileged system user (root) by creating a
   specially-crafted log file, subsequently analyzed by the
   logwatch script.

   Upstream bug report:

   Related patch:

   Other references:

Could you allocate a CVE id for this issue?

Thanks && Regards, Jan.
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ