10
CVSSv2

CVE-2011-1018

Published: 25/02/2011 Updated: 13/02/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

logwatch.pl in Logwatch 7.3.6 allows remote malicious users to execute arbitrary commands via shell metacharacters in a log file name, as demonstrated via a crafted username to a Samba server.

Vulnerable Product Search on Vulmon Subscribe to Product

logwatch logwatch 7.3.6

Vendor Advisories

Debian Bug report logs - #615995 CVE-2011-1018 Package: logwatch; Maintainer for logwatch is Willi Mann <willi@debianorg>; Source for logwatch is src:logwatch (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <muehlenhoff@univentionde> Date: Tue, 1 Mar 2011 16:21:04 UTC Severity: grave Tags: security Found i ...
Dominik George discovered that logwatch did not properly sanitize log file names that were passed to the shell as part of a command If a remote attacker were able to generate specially crafted filenames (for example, via Samba logging), they could execute arbitrary code with root privileges ...
Dominik George discovered that Logwatch does not guard against shell meta-characters in crafted log file names (such as those produced by Samba) As a result, an attacker might be able to execute shell commands on the system running Logwatch For the oldstable distribution (lenny), this problem has been fixed in version 736cvs20080702-2lenny1 F ...

Exploits

source: wwwsecurityfocuscom/bid/46554/info Logwatch is prone to a local privilege-escalation vulnerability Local attackers can exploit this issue execute arbitrary code with superuser privileges Successful exploits will result in the complete compromise of affected computers Failed exploit attempts will result in a denial-of-service c ...