Logwatch: Arbitrary code execution — GLSA 201203-20

A vulnerability in Logwatch might allow remote attackers to execute arbitrary code.

Affected packages

sys-apps/logwatch on all architectures
Affected versions < 7.4.0
Unaffected versions >= 7.4.0

Background

Logwatch analyzes and reports on system logs.

Description

logwatch.pl does not properly sanitize log filenames against shell metacharacters before passing them to the "system()" function.

Impact

A remote attacker could pass a specially crafted log filename to Logwatch, possibly resulting in execution of arbitrary code with root privileges or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All Logwatch users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-apps/logwatch-7.4.0"
 

References

Release date
March 28, 2012

Latest revision
March 28, 2012: 1

Severity
high

Exploitable
remote

Bugzilla entries