Vulnerabilities > CVE-2011-3626 - Resource Management Errors vulnerability in multiple products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Double free vulnerability in the prepare_exec function in src/exec.c in Logsurfer 1.5b and earlier, and Logsurfer+ 1.7 and earlier, allows remote attackers to execute arbitrary commands via crafted strings in a log file.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 10 | |
Application | 6 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-201201-04.NASL |
description | The remote host is affected by the vulnerability described in GLSA-201201-04 (Logsurfer: Arbitrary code execution) Logsurfer log files may contain substrings used for executing external commands. The prepare_exec() function in src/exec.c contains a double-free vulnerability. Impact : A remote attacker could inject specially crafted strings into a log file processed by Logsurfer, resulting in the execution of arbitrary code with the permissions of the Logsurfer user. Workaround : There is no known workaround at this time. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 57630 |
published | 2012-01-23 |
reporter | This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/57630 |
title | GLSA-201201-04 : Logsurfer: Arbitrary code execution |
code |
|
References
- http://secunia.com/advisories/46389
- http://secunia.com/advisories/47725
- http://security.gentoo.org/glsa/glsa-201201-04.xml
- http://www.openwall.com/lists/oss-security/2011/10/17/2
- http://www.openwall.com/lists/oss-security/2011/10/17/4
- https://bugs.gentoo.org/show_bug.cgi?id=387397
- http://secunia.com/advisories/46389
- https://bugs.gentoo.org/show_bug.cgi?id=387397
- http://www.openwall.com/lists/oss-security/2011/10/17/4
- http://www.openwall.com/lists/oss-security/2011/10/17/2
- http://security.gentoo.org/glsa/glsa-201201-04.xml
- http://secunia.com/advisories/47725