CVE-2011-1154

The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
Severity
UNKNOWN
AV:L/AC:M/Au:N/C:C/I:C/A:C
Atk. Vector
LOCAL
Atk. Complexity
MEDIUM
Base Score
CVSS 3.x
EPSS Score
Percentile: 32%
VendorProductVersion
gentoologrotate
𝑥
≤ 3.7.9
gentoologrotate
3.3
gentoologrotate
3.5.9
gentoologrotate
3.5.9
gentoologrotate
3.6.5
gentoologrotate
3.6.5
gentoologrotate
3.7
gentoologrotate
3.7.1
gentoologrotate
3.7.1
gentoologrotate
3.7.1
gentoologrotate
3.7.2
gentoologrotate
3.7.6
gentoologrotate
3.7.7
gentoologrotate
3.7.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
logrotate
bullseye
3.18.0-2+deb11u2
fixed
squeeze
no-dsa
bookworm
3.21.0-1
fixed
sid
3.22.0-1
fixed
trixie
3.22.0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
logrotate
natty
Fixed 3.7.8-6ubuntu3.1
released
maverick
Fixed 3.7.8-6ubuntu1.1
released
lucid
Fixed 3.7.8-4ubuntu2.2
released
karmic
ignored
hardy
not-affected
dapper
not-affected
References