openSUSE Security Update : logrotate (openSUSE-SU-2011:0536-1)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for logrotate provides the following fixes :

- The shred_file function in logrotate might allow
context-dependent attackers to execute arbitrary
commands via shell metacharacters in a log filename, as
demonstrated by a filename that is automatically
constructed on the basis of a hostname or virtual
machine name (CVE-2011-1154) (bnc#679661)

- Race condition in the createOutputFile function in
logrotate allows local users to read log data by opening
a file before the intended permissions are in place
(CVE-2011-1098) (bnc#677336)

- The writeState function in logrotate might allow
context-dependent attackers to cause a denial of service
(rotation outage) via a (1) \n (newline) or (2) \
(backslash) character in a log filename, as demonstrated
by a filename that is automatically constructed on the
basis of a hostname or virtual machine name
(CVE-2011-1155) (bnc#679662)

See also :

http://lists.opensuse.org/opensuse-updates/2011-05/msg00055.html
https://bugzilla.novell.com/show_bug.cgi?id=677336
https://bugzilla.novell.com/show_bug.cgi?id=679661
https://bugzilla.novell.com/show_bug.cgi?id=679662

Solution :

Update the affected logrotate package.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 75638 ()

Bugtraq ID:

CVE ID: CVE-2011-1098
CVE-2011-1154
CVE-2011-1155

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now