CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
30.2%
The writeState function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to cause a denial of service (rotation outage) via a (1) \n (newline) or (2) \ (backslash) character in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
Vendor | Product | Version | CPE |
---|---|---|---|
gentoo | logrotate | * | cpe:2.3:a:gentoo:logrotate:*:*:*:*:*:*:*:* |
gentoo | logrotate | 3.3 | cpe:2.3:a:gentoo:logrotate:3.3:r2:*:*:*:*:*:* |
gentoo | logrotate | 3.5.9 | cpe:2.3:a:gentoo:logrotate:3.5.9:*:*:*:*:*:*:* |
gentoo | logrotate | 3.5.9 | cpe:2.3:a:gentoo:logrotate:3.5.9:r1:*:*:*:*:*:* |
gentoo | logrotate | 3.6.5 | cpe:2.3:a:gentoo:logrotate:3.6.5:*:*:*:*:*:*:* |
gentoo | logrotate | 3.6.5 | cpe:2.3:a:gentoo:logrotate:3.6.5:r1:*:*:*:*:*:* |
gentoo | logrotate | 3.7 | cpe:2.3:a:gentoo:logrotate:3.7:*:*:*:*:*:*:* |
gentoo | logrotate | 3.7.1 | cpe:2.3:a:gentoo:logrotate:3.7.1:*:*:*:*:*:*:* |
gentoo | logrotate | 3.7.1 | cpe:2.3:a:gentoo:logrotate:3.7.1:r1:*:*:*:*:*:* |
gentoo | logrotate | 3.7.1 | cpe:2.3:a:gentoo:logrotate:3.7.1:r2:*:*:*:*:*:* |
lists.fedoraproject.org/pipermail/package-announce/2011-April/057845.html
lists.fedoraproject.org/pipermail/package-announce/2011-March/056992.html
openwall.com/lists/oss-security/2011/03/04/16
openwall.com/lists/oss-security/2011/03/04/17
openwall.com/lists/oss-security/2011/03/04/18
openwall.com/lists/oss-security/2011/03/04/19
openwall.com/lists/oss-security/2011/03/04/22
openwall.com/lists/oss-security/2011/03/04/24
openwall.com/lists/oss-security/2011/03/04/25
openwall.com/lists/oss-security/2011/03/04/26
openwall.com/lists/oss-security/2011/03/04/27
openwall.com/lists/oss-security/2011/03/04/28
openwall.com/lists/oss-security/2011/03/04/29
openwall.com/lists/oss-security/2011/03/04/30
openwall.com/lists/oss-security/2011/03/04/31
openwall.com/lists/oss-security/2011/03/04/32
openwall.com/lists/oss-security/2011/03/04/33
openwall.com/lists/oss-security/2011/03/05/4
openwall.com/lists/oss-security/2011/03/05/6
openwall.com/lists/oss-security/2011/03/05/8
openwall.com/lists/oss-security/2011/03/06/3
openwall.com/lists/oss-security/2011/03/06/4
openwall.com/lists/oss-security/2011/03/06/5
openwall.com/lists/oss-security/2011/03/06/6
openwall.com/lists/oss-security/2011/03/07/11
openwall.com/lists/oss-security/2011/03/07/5
openwall.com/lists/oss-security/2011/03/07/6
openwall.com/lists/oss-security/2011/03/08/5
openwall.com/lists/oss-security/2011/03/10/2
openwall.com/lists/oss-security/2011/03/10/3
openwall.com/lists/oss-security/2011/03/10/6
openwall.com/lists/oss-security/2011/03/10/7
openwall.com/lists/oss-security/2011/03/11/3
openwall.com/lists/oss-security/2011/03/11/5
openwall.com/lists/oss-security/2011/03/14/26
openwall.com/lists/oss-security/2011/03/23/11
secunia.com/advisories/43955
www.mandriva.com/security/advisories?name=MDVSA-2011:065
www.redhat.com/support/errata/RHSA-2011-0407.html
www.vupen.com/english/advisories/2011/0791
www.vupen.com/english/advisories/2011/0872
www.vupen.com/english/advisories/2011/0961
bugzilla.redhat.com/show_bug.cgi?id=680797