Date: Thu, 24 Feb 2011 15:57:41 -0500 (EST) From: Josh Bressers <bressers@...hat.com> To: oss-security@...ts.openwall.com Cc: Mike Tremaine <mgt@...llarcore.net>, Karel Klic <kklic@...hat.com>, "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE Request -- logwatch: Privilege escalation due improper sanitization of special characters in log file names Please use CVE-2011-1018 Thanks. -- JB ----- Original Message ----- > Hello Josh, Steve, vendors, > > a security flaw was found in the way logwatch, a log file > analysis program, pre-processed log files, containing certain > special characters in their names. A remote attacker could > use this flaw to execute arbitrary code with the privileges > of the privileged system user (root) by creating a > specially-crafted log file, subsequently analyzed by the > logwatch script. > > Upstream bug report: >  > http://sourceforge.net/tracker/?func=detail&aid=3184223&group_id=312875&atid=1316824 > > Related patch: >  > http://logwatch.svn.sourceforge.net/viewvc/logwatch?view=revision&revision=26 > > Other references: >  > http://sourceforge.net/mailarchive/forum.php?thread_name=4D604843.7040303%40mblmail.net&forum_name=logwatch-devel >  https://bugzilla.redhat.com/show_bug.cgi?id=680237 > > Could you allocate a CVE id for this issue? > > Thanks && Regards, Jan. > -- > Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ