Logwatch Secure Script Denial Of Service Vulnerability

BID:13273

Info

Logwatch Secure Script Denial Of Service Vulnerability

Bugtraq ID: 13273
Class: Input Validation Error
CVE: CVE-2005-1061
Remote: Yes
Local: Yes
Published: Apr 20 2005 12:00AM
Updated: Jul 12 2009 02:06PM
Credit: This issue was announced by Red Hat.
Vulnerable: LogWatch LogWatch 2.6
+ Redhat Advanced Workstation for the Itanium Processor 2.1 IA64
+ Redhat Advanced Workstation for the Itanium Processor 2.1 IA64
+ Redhat Advanced Workstation for the Itanium Processor 2.1
+ Redhat Advanced Workstation for the Itanium Processor 2.1
+ Redhat Enterprise Linux AS 2.1
+ Redhat Enterprise Linux AS 2.1
+ Redhat Enterprise Linux ES 2.1
+ Redhat Enterprise Linux ES 2.1
+ Redhat Enterprise Linux WS 2.1
LogWatch LogWatch 2.5
LogWatch LogWatch 2.1.1
+ Redhat Linux 7.2 ia64
+ Redhat Linux 7.2 ia64
+ Redhat Linux 7.2 i386
+ Redhat Linux 7.2 i386
+ Redhat Linux 7.2 alpha
Not Vulnerable:

Discussion

Logwatch Secure Script Denial Of Service Vulnerability

Logwatch is prone to a denial of vulnerability in the secure script.

This issue may be exploited by a local attacker who can inject a malicious string into a log file, causing a denial of service condition. As a result, the utility may not detect subsequent malicious activity.

Exploit / POC

Logwatch Secure Script Denial Of Service Vulnerability

There is no exploit required.

The following example was provided to demonstrate how to reproduce the issue:

logger -p authpriv.notice '+++ connection closed by localhost +++'

Solution / Fix

Logwatch Secure Script Denial Of Service Vulnerability

Solution:
Red Hat has released fixes to address this issue on affected platforms. These fixes are available through the Red Hat Network and may be obtained by running the Red Hat Update Agent. Please see attached advisory RHSA-2005:364-06 for further details.

References

Logwatch Secure Script Denial Of Service Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report