Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 24 Feb 2011 15:57:41 -0500 (EST)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: Mike Tremaine <mgt@...llarcore.net>, Karel Klic <kklic@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE Request -- logwatch: Privilege escalation
 due improper sanitization of special characters in log file names

Please use CVE-2011-1018

Thanks.

-- 
    JB

----- Original Message -----
> Hello Josh, Steve, vendors,
> 
> a security flaw was found in the way logwatch, a log file
> analysis program, pre-processed log files, containing certain
> special characters in their names. A remote attacker could
> use this flaw to execute arbitrary code with the privileges
> of the privileged system user (root) by creating a
> specially-crafted log file, subsequently analyzed by the
> logwatch script.
> 
> Upstream bug report:
> [1]
> http://sourceforge.net/tracker/?func=detail&aid=3184223&group_id=312875&atid=1316824
> 
> Related patch:
> [2]
> http://logwatch.svn.sourceforge.net/viewvc/logwatch?view=revision&revision=26
> 
> Other references:
> [3]
> http://sourceforge.net/mailarchive/forum.php?thread_name=4D604843.7040303%40mblmail.net&forum_name=logwatch-devel
> [4] https://bugzilla.redhat.com/show_bug.cgi?id=680237
> 
> Could you allocate a CVE id for this issue?
> 
> Thanks && Regards, Jan.
> --
> Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ