CVE-2011-1154

EUVD-2011-1167
The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.9 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 16%
Affected Products (NVD)
VendorProductVersion
gentoologrotate
𝑥
≤ 3.7.9
gentoologrotate
3.3:r2
gentoologrotate
3.5.9
gentoologrotate
3.5.9:r1
gentoologrotate
3.6.5
gentoologrotate
3.6.5:r1
gentoologrotate
3.7
gentoologrotate
3.7.1
gentoologrotate
3.7.1:r1
gentoologrotate
3.7.1:r2
gentoologrotate
3.7.2
gentoologrotate
3.7.6
gentoologrotate
3.7.7
gentoologrotate
3.7.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
logrotate
bookworm
3.21.0-1
fixed
bullseye
3.18.0-2+deb11u2
fixed
sid
3.22.0-1
fixed
squeeze
no-dsa
trixie
3.22.0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
logrotate
dapper
not-affected
hardy
not-affected
karmic
ignored
lucid
Fixed 3.7.8-4ubuntu2.2
released
maverick
Fixed 3.7.8-6ubuntu1.1
released
natty
Fixed 3.7.8-6ubuntu3.1
released
References