CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
EPSS
Percentile
29.8%
The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | logrotate | <Β 3.8.0-1 | logrotate_3.8.0-1_all.deb |
Debian | 11 | all | logrotate | <Β 3.8.0-1 | logrotate_3.8.0-1_all.deb |
Debian | 999 | all | logrotate | <Β 3.8.0-1 | logrotate_3.8.0-1_all.deb |
Debian | 13 | all | logrotate | <Β 3.8.0-1 | logrotate_3.8.0-1_all.deb |