Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-1154

Опубликовано: 13 фев. 2011
Источник: redhat
CVSS2: 6.9
EPSS Низкий

Описание

The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.

Отчет

Not vulnerable. This issue did not affect the versions of logrotate as shipped with Red Hat Enterprise Linux 4 and 5, as they did not support 'shred' logrotate configuration directive yet.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4logrotateNot affected
Red Hat Enterprise Linux 5logrotateNot affected
Red Hat Enterprise Linux 6logrotateFixedRHSA-2011:040731.03.2011

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=680796logrotate: Shell command injection by using the shred configuration directive

EPSS

Процентиль: 16%
0.00051
Низкий

6.9 Medium

CVSS2

Связанные уязвимости

ubuntu
около 15 лет назад

The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.

nvd
около 15 лет назад

The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.

debian
около 15 лет назад

The shred_file function in logrotate.c in logrotate 3.7.9 and earlier ...

github
почти 4 года назад

The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.

oracle-oval
около 15 лет назад

ELSA-2011-0407: logrotate security update (MODERATE)

EPSS

Процентиль: 16%
0.00051
Низкий

6.9 Medium

CVSS2