logwatch vulnerability

Related Vulnerabilities: CVE-2011-1018  

Dominik George discovered that logwatch did not properly sanitize log file names that were passed to the shell as part of a command. If a remote attacker were able to generate specially crafted filenames (for example, via Samba logging), they could execute arbitrary code with root privileges.

The problem can be corrected by updating your system to the following package versions:

1 March 2011

logwatch vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 10.10
  • Ubuntu 10.04 LTS
  • Ubuntu 9.10
  • Ubuntu 8.04 LTS

Summary

Software Description

  • logwatch

Details

Dominik George discovered that logwatch did not properly sanitize log file names that were passed to the shell as part of a command. If a remote attacker were able to generate specially crafted filenames (for example, via Samba logging), they could execute arbitrary code with root privileges.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 10.10
logwatch - 7.3.6.cvs20090906-1ubuntu3.1
Ubuntu 10.04 LTS
logwatch - 7.3.6.cvs20090906-1ubuntu2.1
Ubuntu 9.10
logwatch - 7.3.6.cvs20090906-1ubuntu1.1
Ubuntu 8.04 LTS
logwatch - 7.3.6-1ubuntu1.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References