Vulnerability CVE-2015-8325


Published: 2016-04-30   Modified: 2016-05-01

Description:
The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Openbsd -> Openssh 
Debian -> Debian linux 
Canonical -> Ubuntu core 
Canonical -> Ubuntu linux 
Canonical -> Ubuntu touch 

 References:
http://rhn.redhat.com/errata/RHSA-2016-2588.html
http://rhn.redhat.com/errata/RHSA-2017-0641.html
http://www.debian.org/security/2016/dsa-3550
http://www.securityfocus.com/bid/86187
http://www.securitytracker.com/id/1036487
https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755
https://bugzilla.redhat.com/show_bug.cgi?id=1328012
https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8325.html
https://security-tracker.debian.org/tracker/CVE-2015-8325
https://security.gentoo.org/glsa/201612-18
https://security.netapp.com/advisory/ntap-20180628-0001/

Copyright 2024, cxsecurity.com

 

Back to Top