First published: Mon Apr 18 2016(Updated: )
If PAM is configured to read user-specified environment variables and UseLogin=yes in sshd_config, then a hostile local user may attack /bin/login via LD_PRELOAD or similar environment variables set via PAM. Upstream fix: <a href="https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755">https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755</a> Debian advisory: <a href="https://www.debian.org/security/2016/dsa-3550">https://www.debian.org/security/2016/dsa-3550</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openssh | 1:8.4p1-5+deb11u3 1:9.2p1-2+deb12u3 1:9.9p1-3 | |
Debian | =7.0 | |
Debian | =8.0 | |
OpenSSH | <=7.2 | |
uWSGI Core | =15.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.10 | |
Ubuntu Touch | =15.04 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8325 is considered a high severity vulnerability due to the risk of local privilege escalation.
To fix CVE-2015-8325, update your OpenSSH package to a version that includes the security patch.
CVE-2015-8325 affects systems with vulnerable versions of OpenSSH, particularly those configured with UseLogin enabled.
CVE-2015-8325 can be exploited by a local user with access to environment variables.
Yes, CVE-2015-8325 has been patched in recent versions of OpenSSH as indicated in the upstream fix.