First published: Wed Apr 02 2008(Updated: )
Stack-based buffer overflow in the audit_log_user_command function in lib/audit_logging.c in Linux Audit before 1.7 might allow remote attackers to execute arbitrary code via a long command argument. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Audit | <=1.6.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1628 is classified as a high severity vulnerability due to the potential for remote code execution.
To mitigate CVE-2008-1628, upgrade to Linux Audit version 1.7 or later.
CVE-2008-1628 affects Linux Audit versions prior to 1.7, specifically those up to and including version 1.6.9.
CVE-2008-1628 enables remote attackers to execute arbitrary code through a stack-based buffer overflow.
CVE-2008-1628 is less of a concern in modern systems that have been updated to the latest versions of Linux Audit.