7.8
CVSSv3

CVE-2015-8325

Published: 01/05/2016 Updated: 13/12/2022
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 643
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The do_setup_env function in session.c in sshd in OpenSSH up to and including 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

debian debian linux 8.0

debian debian linux 7.0

openbsd openssh

canonical ubuntu touch 15.04

canonical ubuntu linux 12.04

canonical ubuntu core 15.04

canonical ubuntu linux 15.10

canonical ubuntu linux 14.04

Vendor Advisories

Synopsis Moderate: openssh security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for openssh is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) ba ...
Several security issues were fixed in OpenSSH ...
Shayan Sadigh discovered a vulnerability in OpenSSH: If PAM support is enabled and the sshd PAM configuration is configured to read userspecified environment variables and the UseLogin option is enabled, a local user may escalate her privileges to root In Debian UseLogin is not enabled by default For the oldstable distribution (wheezy), this prob ...
It was discovered that the OpenSSH sshd daemon fetched PAM environment settings before running the login program In configurations with UseLogin=yes and the pam_env PAM module configured to read user environment settings, a local user could use this flaw to execute arbitrary code as root ...
It was discovered that the OpenSSH sshd daemon fetched PAM environment settings before running the login program In configurations with UseLogin=yes and the pam_env PAM module configured to read user environment settings, a local user could use this flaw to execute arbitrary code as root ...