CVE-2005-1061
CVSS5.0
发布时间 :2005-05-02 00:00:00
修订时间 :2008-09-05 16:48:06
NMCOS    

[原文]The secure script in LogWatch before 2.6-2 allows attackers to prevent LogWatch from detecting malicious activity via certain strings in the secure file that are later used as part of a regular expression, which causes the parser to crash, aka "logwatch log processing regular expression DoS."


[CNNVD]Logwatch安全脚本拒绝服务漏洞(CNNVD-200505-491)

        LogWatch 2.6-2之前版本中的安全脚本,允许攻击者通过安全文件中包含的稍后将作为正则表达式组成部分的某些字符串来防止LogWatch检测恶意操作,从而引起解析器崩溃,又称为"logwatch log处理正则表达式DoS"。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:redhat:linux_advanced_workstation:2.1::itanium
cpe:/a:logwatch:logwatch:2.6.2
cpe:/o:redhat:enterprise_linux:2.1::workstation
cpe:/o:redhat:enterprise_linux:2.1::advanced_server
cpe:/o:redhat:enterprise_linux:2.1::enterprise_server

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1061
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1061
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-491
(官方数据源) CNNVD

- 其它链接及资源

https://bugzilla.redhat.com/bugzilla-old/show_bug.cgi?id=137502
(UNKNOWN)  CONFIRM  https://bugzilla.redhat.com/bugzilla-old/show_bug.cgi?id=137502
http://www.redhat.com/support/errata/RHSA-2005-364.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2005:364

- 漏洞信息

Logwatch安全脚本拒绝服务漏洞
中危 输入验证
2005-05-02 00:00:00 2005-10-20 00:00:00
远程※本地  
        LogWatch 2.6-2之前版本中的安全脚本,允许攻击者通过安全文件中包含的稍后将作为正则表达式组成部分的某些字符串来防止LogWatch检测恶意操作,从而引起解析器崩溃,又称为"logwatch log处理正则表达式DoS"。

- 公告与补丁

        暂无数据

- 漏洞信息

15708
Red Hat Linux logwatch secure Log Parsing DoS
Local Access Required Denial of Service
Loss of Availability
Exploit Unknown

- 漏洞描述

Logwatch contains a flaw that may allow a local denial of service. The issue is triggered when a specially crafted string is injected into /var/log/secure causing the script to crash thus preventing logwatch from detecting subsequent malicious activities.

- 时间线

2005-04-19 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.6-2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Logwatch Secure Script Denial Of Service Vulnerability
Input Validation Error 13273
Yes Yes
2005-04-20 12:00:00 2009-07-12 02:06:00
This issue was announced by Red Hat.

- 受影响的程序版本

LogWatch LogWatch 2.6
+ Red Hat Enterprise Linux AS 2.1
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Advanced Workstation for the Itanium Processor 2.1 IA64
+ RedHat Advanced Workstation for the Itanium Processor 2.1 IA64
+ RedHat Advanced Workstation for the Itanium Processor 2.1
+ RedHat Advanced Workstation for the Itanium Processor 2.1
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 2.1
LogWatch LogWatch 2.5
LogWatch LogWatch 2.1.1
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 alpha

- 漏洞讨论

Logwatch is prone to a denial of vulnerability in the secure script.

This issue may be exploited by a local attacker who can inject a malicious string into a log file, causing a denial of service condition. As a result, the utility may not detect subsequent malicious activity.

- 漏洞利用

There is no exploit required.

The following example was provided to demonstrate how to reproduce the issue:

logger -p authpriv.notice '+++ connection closed by localhost +++'

- 解决方案

Red Hat has released fixes to address this issue on affected platforms. These fixes are available through the Red Hat Network and may be obtained by running the Red Hat Update Agent. Please see attached advisory RHSA-2005:364-06 for further details.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站