Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2011-1154


The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.


Published

2011-03-30T22:55:02.360

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.9 (MEDIUM)

CVSSv2 Vector

AV:L/AC:M/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.4

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application gentoo logrotate ≤ 3.7.9 Yes
Application gentoo logrotate 3.3 Yes
Application gentoo logrotate 3.5.9 Yes
Application gentoo logrotate 3.5.9 Yes
Application gentoo logrotate 3.6.5 Yes
Application gentoo logrotate 3.6.5 Yes
Application gentoo logrotate 3.7 Yes
Application gentoo logrotate 3.7.1 Yes
Application gentoo logrotate 3.7.1 Yes
Application gentoo logrotate 3.7.1 Yes
Application gentoo logrotate 3.7.2 Yes
Application gentoo logrotate 3.7.6 Yes
Application gentoo logrotate 3.7.7 Yes
Application gentoo logrotate 3.7.8 Yes

References