{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2011-02-16T00:00:00.000Z","descriptions":[{"lang":"en","value":"logwatch.pl in Logwatch 7.3.6 allows remote attackers to execute arbitrary commands via shell metacharacters in a log file name, as demonstrated via a crafted username to a Samba server."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2014-02-06T20:57:02.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"[oss-security] 20110224 Re: CVE Request -- logwatch: Privilege escalation due improper sanitization of special characters in log file names","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2011/02/24/15"},{"tags":["x_refsource_CONFIRM"],"url":"http://sourceforge.net/tracker/?func=detail&aid=3184223&group_id=312875&atid=1316824"},{"name":"ADV-2011-0581","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2011/0581"},{"name":"43495","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/43495"},{"name":"FEDORA-2011-2318","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055585.html"},{"name":"DSA-2182","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2011/dsa-2182"},{"name":"FEDORA-2011-2396","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055617.html"},{"name":"43356","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/43356"},{"name":"ADV-2011-0533","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2011/0533"},{"name":"SUSE-SR:2011:005","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"},{"name":"[oss-security] 20110224 CVE Request -- logwatch: Privilege escalation due improper sanitization of special characters in log file names","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2011/02/24/13"},{"name":"43644","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/43644"},{"name":"RHSA-2011:0324","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2011-0324.html"},{"name":"43622","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/43622"},{"name":"46554","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/46554"},{"tags":["x_refsource_CONFIRM"],"url":"http://logwatch.svn.sourceforge.net/viewvc/logwatch/scripts/logwatch.pl?r1=3&r2=26&pathrev=26"},{"name":"USN-1078-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-1078-1"},{"name":"ADV-2011-0596","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2011/0596"},{"name":"FEDORA-2011-2328","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055579.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=680237"},{"name":"[Logwatch-devel] 20110216 Remote command execution issue with root privileges","tags":["mailing-list","x_refsource_MLIST"],"url":"http://sourceforge.net/mailarchive/forum.php?thread_name=4D604843.7040303%40mblmail.net&forum_name=logwatch-devel"},{"name":"43734","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/43734"},{"name":"1025165","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1025165"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T22:14:27.220Z"},"title":"CVE Program Container","references":[{"name":"[oss-security] 20110224 Re: CVE Request -- logwatch: Privilege escalation due improper sanitization of special characters in log file names","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2011/02/24/15"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://sourceforge.net/tracker/?func=detail&aid=3184223&group_id=312875&atid=1316824"},{"name":"ADV-2011-0581","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2011/0581"},{"name":"43495","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/43495"},{"name":"FEDORA-2011-2318","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055585.html"},{"name":"DSA-2182","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2011/dsa-2182"},{"name":"FEDORA-2011-2396","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055617.html"},{"name":"43356","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/43356"},{"name":"ADV-2011-0533","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2011/0533"},{"name":"SUSE-SR:2011:005","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"},{"name":"[oss-security] 20110224 CVE Request -- logwatch: Privilege escalation due improper sanitization of special characters in log file names","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2011/02/24/13"},{"name":"43644","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/43644"},{"name":"RHSA-2011:0324","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2011-0324.html"},{"name":"43622","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/43622"},{"name":"46554","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/46554"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://logwatch.svn.sourceforge.net/viewvc/logwatch/scripts/logwatch.pl?r1=3&r2=26&pathrev=26"},{"name":"USN-1078-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-1078-1"},{"name":"ADV-2011-0596","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2011/0596"},{"name":"FEDORA-2011-2328","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055579.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=680237"},{"name":"[Logwatch-devel] 20110216 Remote command execution issue with root privileges","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://sourceforge.net/mailarchive/forum.php?thread_name=4D604843.7040303%40mblmail.net&forum_name=logwatch-devel"},{"name":"43734","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/43734"},{"name":"1025165","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1025165"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2011-1018","datePublished":"2011-02-25T18:00:00.000Z","dateReserved":"2011-02-14T00:00:00.000Z","dateUpdated":"2024-08-06T22:14:27.220Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}