USN-1078-1: Logwatch vulnerability

Publication date

1 March 2011

Overview


Packages

Details

Dominik George discovered that logwatch did not properly sanitize
log file names that were passed to the shell as part of a command.
If a remote attacker were able to generate specially crafted filenames
(for example, via Samba logging), they could execute arbitrary code
with root privileges.

Dominik George discovered that logwatch did not properly sanitize
log file names that were passed to the shell as part of a command.
If a remote attacker were able to generate specially crafted filenames
(for example, via Samba logging), they could execute arbitrary code
with root privileges.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
9.10 karmic logwatch –  7.3.6.cvs20090906-1ubuntu1.1
8.04 hardy logwatch –  7.3.6-1ubuntu1.1
10.10 maverick logwatch –  7.3.6.cvs20090906-1ubuntu3.1
10.04 lucid logwatch –  7.3.6.cvs20090906-1ubuntu2.1

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›