RSS   Podatności dla 'Logrotate'   RSS

2011-03-30
 
CVE-2011-1550

CWE-264
 

 
The default configuration of logrotate on SUSE openSUSE Factory uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories for the (1) cobbler, (2) inn, (3) safte-monitor, and (4) uucp packages.

 
 
CVE-2011-1549

CWE-264
 

 
The default configuration of logrotate on Gentoo Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories under /var/log/ for packages.

 
 
CVE-2011-1548

CWE-264
 

 
The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by /var/log/postgresql/.

 
 
CVE-2011-1155

CWE-399
 

 
The writeState function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to cause a denial of service (rotation outage) via a (1) \n (newline) or (2) \ (backslash) character in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.

 
 
CVE-2011-1154

CWE-20
 

 
The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.

 
 
CVE-2011-1098

CWE-362
 

 
Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and earlier allows local users to read log data by opening a file before the intended permissions are in place.

 

 >>> Vendor: Gentoo 27 Produkty
Linux
Syslinux
Mirrorselect
Poppassd pam
Webmin
Rootkit hunter
Linux webapp-config
Linux eix
Qt-unixodbc
Nview
Xnview
App-crypt pinentry
Media-libs jpeg
FILE
Glibc
Nvclock
Mldonkey ebuild
Portage
Xdg-utils
Php toolkit
CMAN
Fence
Logrotate
Nullmailer
Libsndfile
Dev-python-flower
Sci-mathematics-gimps


Copyright 2024, cxsecurity.com

 

Back to Top