Logsurfer: Arbitrary code execution — GLSA 201201-04

A double-free flaw in Logsurfer allows a remote attacker to execute arbitrary code.

Affected packages

app-admin/logsurfer+ on all architectures
Affected versions < 1.8
Unaffected versions >= 1.8

Background

Logsurfer is a real time log monitoring and analysis tool.

Description

Logsurfer log files may contain substrings used for executing external commands. The prepare_exec() function in src/exec.c contains a double-free vulnerability.

Impact

A remote attacker could inject specially-crafted strings into a log file processed by Logsurfer, resulting in the execution of arbitrary code with the permissions of the Logsurfer user.

Workaround

There is no known workaround at this time.

Resolution

All Logsurfer users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-admin/logsurfer+-1.8"
 

References

Release date
January 20, 2012

Latest revision
January 20, 2012: 1

Severity
normal

Exploitable
remote

Bugzilla entries