CVE Vulnerabilities

CVE-2015-8325

Published: May 01, 2016 | Modified: Apr 12, 2025
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
6.2 MODERATE
AV:L/AC:H/Au:N/C:C/I:C/A:C
RedHat/V3
7 MODERATE
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.

Affected Software

NameVendorStart VersionEnd Version
Debian_linuxDebian7.0 (including)7.0 (including)
Debian_linuxDebian8.0 (including)8.0 (including)
Red Hat Enterprise Linux 6RedHatopenssh-0:5.3p1-122.el6*
Red Hat Enterprise Linux 7RedHatopenssh-0:6.6.1p1-31.el7*
OpensshUbuntuesm-infra-legacy/trusty*
OpensshUbuntuprecise*
OpensshUbuntutrusty*
OpensshUbuntutrusty/esm*
OpensshUbuntuupstream*
OpensshUbuntuvivid/stable-phone-overlay*
OpensshUbuntuvivid/ubuntu-core*
OpensshUbuntuwily*

References