First published: Wed Apr 23 2008(Updated: )
Argument injection vulnerability in login (login-utils/login.c) in util-linux-ng 2.14 and earlier makes it easier for remote attackers to hide activities by modifying portions of log events, as demonstrated by appending an "addr=" statement to the login name, aka "audit log injection."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux | =2.13 | |
Linux | =2.13.0.1 | |
Linux | =2.13.1 | |
Linux | =2.13.1.1 | |
Linux | =2.14-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2008-1926 is considered moderate due to its potential for audit log injection.
To fix CVE-2008-1926, upgrade to util-linux-ng version 2.15 or later, which addresses the vulnerability.
CVE-2008-1926 affects util-linux-ng versions 2.14 and earlier, particularly on Ubuntu Linux.
CVE-2008-1926 can enable remote attackers to hide their activities by modifying log events through argument injection.
Yes, CVE-2008-1926 can be exploited relatively easily by using crafted login names that include special characters.