Logwatch: Arbitrary code execution A vulnerability in Logwatch might allow remote attackers to execute arbitrary code. Logwatch 2012-03-28 2012-03-28 356387 remote 7.4.0 7.4.0

Logwatch analyzes and reports on system logs.

logwatch.pl does not properly sanitize log filenames against shell metacharacters before passing them to the "system()" function.

A remote attacker could pass a specially crafted log filename to Logwatch, possibly resulting in execution of arbitrary code with root privileges or a Denial of Service condition.

There is no known workaround at this time.

All Logwatch users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=sys-apps/logwatch-7.4.0"
CVE-2011-1018 ackle ackle