CVE-2005-1061

The secure script in LogWatch before 2.6-2 allows attackers to prevent LogWatch from detecting malicious activity via certain strings in the secure file that are later used as part of a regular expression, which causes the parser to crash, aka "logwatch log processing regular expression DoS."
Configurations

Configuration 1 (hide)

cpe:2.3:a:logwatch:logwatch:2.6.2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*

History

20 Nov 2024, 23:56

Type Values Removed Values Added
References () http://www.redhat.com/support/errata/RHSA-2005-364.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-364.html - Vendor Advisory
References () https://bugzilla.redhat.com/bugzilla-old/show_bug.cgi?id=137502 - () https://bugzilla.redhat.com/bugzilla-old/show_bug.cgi?id=137502 -

Information

Published : 2005-05-02 04:00

Updated : 2024-11-20 23:56


NVD link : CVE-2005-1061

Mitre link : CVE-2005-1061

CVE.ORG link : CVE-2005-1061


JSON object : View

Products Affected

logwatch

  • logwatch

redhat

  • enterprise_linux
  • linux_advanced_workstation