openSUSE Security Update : logrotate (openSUSE-SU-2011:0536-1)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for logrotate provides the following fixes :

dbg114-logrotate-4580 logrotate-4580 new_updateinfo The shred_file
function in logrotate might allow context-dependent attackers to
execute arbitrary commands via shell metacharacters in a log filename,
as demonstrated by a filename that is automatically constructed on the
basis of a hostname or virtual machine name (CVE-2011-1154)
(bnc#679661)

dbg114-logrotate-4580 logrotate-4580 new_updateinfo Race condition in
the createOutputFile function in logrotate allows local users to read
log data by opening a file before the intended permissions are in
place (CVE-2011-1098) (bnc#677336)

dbg114-logrotate-4580 logrotate-4580 new_updateinfo The writeState
function in logrotate might allow context-dependent attackers to cause
a denial of service (rotation outage) via a (1) n (newline) or (2)
(backslash) character in a log filename, as demonstrated by a filename
that is automatically constructed on the basis of a hostname or
virtual machine name (CVE-2011-1155) (bnc#679662)

See also :

http://lists.opensuse.org/opensuse-updates/2011-05/msg00055.html
https://bugzilla.novell.com/show_bug.cgi?id=677336
https://bugzilla.novell.com/show_bug.cgi?id=679661
https://bugzilla.novell.com/show_bug.cgi?id=679662

Solution :

Update the affected logrotate packages.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 75942 ()

Bugtraq ID:

CVE ID: CVE-2011-1098
CVE-2011-1154
CVE-2011-1155

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now