CVE-2011-1018

Source
https://nvd.nist.gov/vuln/detail/CVE-2011-1018
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2011-1018.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2011-1018
Related
Published
2011-02-25T19:00:01Z
Modified
2025-04-11T00:51:21Z
Downstream
Summary
[none]
Details

logwatch.pl in Logwatch 7.3.6 allows remote attackers to execute arbitrary commands via shell metacharacters in a log file name, as demonstrated via a crafted username to a Samba server.

References

Affected packages

Debian:11 / logwatch

Package

Name
logwatch
Purl
pkg:deb/debian/logwatch?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.3.6.cvs20090906-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / logwatch

Package

Name
logwatch
Purl
pkg:deb/debian/logwatch?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.3.6.cvs20090906-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / logwatch

Package

Name
logwatch
Purl
pkg:deb/debian/logwatch?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.3.6.cvs20090906-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}