First published: Thu Apr 21 2005(Updated: )
The secure script in LogWatch before 2.6-2 allows attackers to prevent LogWatch from detecting malicious activity via certain strings in the secure file that are later used as part of a regular expression, which causes the parser to crash, aka "logwatch log processing regular expression DoS."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Swatch | =2.6.2 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Linux Advanced Workstation | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1061 is a vulnerability that poses a denial-of-service risk due to improper handling of certain strings in LogWatch.
To fix CVE-2005-1061, upgrade LogWatch to version 2.6.2 or later.
CVE-2005-1061 affects LogWatch versions prior to 2.6-2 and specific Red Hat Enterprise Linux versions.
CVE-2005-1061 is categorized as a denial-of-service vulnerability impacting the log processing functionality of LogWatch.
Yes, attackers can exploit CVE-2005-1061 remotely through crafted log entries that cause the LogWatch parser to crash.