First published: Sun Feb 27 2011(Updated: )
A denial of service flaw was found in the way the logrotate utility performed arguments sanitization, when performing the 'write state' action. A local attacker could use this flaw to cause abort in subsequent logrotate runs via a specially-crafted log file name.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Logrotate | <=3.7.9 | |
Logrotate | =3.3-r2 | |
Logrotate | =3.5.9 | |
Logrotate | =3.5.9-r1 | |
Logrotate | =3.6.5 | |
Logrotate | =3.6.5-r1 | |
Logrotate | =3.7 | |
Logrotate | =3.7.1 | |
Logrotate | =3.7.1-r1 | |
Logrotate | =3.7.1-r2 | |
Logrotate | =3.7.2 | |
Logrotate | =3.7.6 | |
Logrotate | =3.7.7 | |
Logrotate | =3.7.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1155 is classified as a denial of service vulnerability.
To address CVE-2011-1155, update logrotate to the latest available version.
Logrotate versions up to 3.7.9 and certain specific earlier versions are affected by CVE-2011-1155.
CVE-2011-1155 can be exploited by local attackers with the ability to craft a malicious log file name.
CVE-2011-1155 can cause a denial of service, leading to abort in subsequent logrotate executions.