Vulnerability Details : CVE-2008-1926
Potential exploit
Argument injection vulnerability in login (login-utils/login.c) in util-linux-ng 2.14 and earlier makes it easier for remote attackers to hide activities by modifying portions of log events, as demonstrated by appending an "addr=" statement to the login name, aka "audit log injection."
Products affected by CVE-2008-1926
- cpe:2.3:a:linux:util-linux:2.14:rc1:*:*:*:*:*:*
- cpe:2.3:a:linux:util-linux:2.13:*:*:*:*:*:*:*
- cpe:2.3:a:linux:util-linux:2.13.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:linux:util-linux:2.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:linux:util-linux:2.13.1.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-1926
1.77%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-1926
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2008-1926
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2008-1926
-
Red Hat 2009-05-18Red Hat is aware of this issue affecting Red Hat Enterprise Linux 5 and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-1926 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. This issue has been addressed in Red Hat Enterprise Linux 4 with the following update: https://rhn.redhat.com/errata/RHSA-2009-0981.html
References for CVE-2008-1926
-
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00624.html
[SECURITY] Fedora 8 Update: util-linux-ng-2.13.1-2.fc8
-
http://www.redhat.com/support/errata/RHSA-2009-0981.html
Support
-
http://www.securitytracker.com/id?1022256
Access Denied
-
http://www.vupen.com/english/advisories/2008/1392/references
Site en construction
-
http://git.kernel.org/?p=utils/util-linux-ng/util-linux-ng.git%3Ba=blobdiff%3Bf=login-utils/login.c%3Bh=230121316d953c59e7842c1325f6e9f326a37608%3Bhp=aad27794327c60391b5148b367d2c79338fc6ee4%3Bhb=8ccf0b253ac0f4f58d64bc9674de18bff5a88782%3Bhpb=3a4a13b12a8065b0b5354686d2807cce421a9973
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9833
404 Not Found
-
http://www.securityfocus.com/archive/1/507854/100/0/threaded
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41987
util-linux-ng login data manipulation CVE-2008-1926 Vulnerability Report
-
http://secunia.com/advisories/29982
About Secunia Research | Flexera
-
http://secunia.com/advisories/30014
About Secunia Research | Flexera
-
http://wiki.rpath.com/Advisories:rPSA-2009-0143
-
http://secunia.com/advisories/35161
About Secunia Research | Flexera
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:114
Mandriva
-
http://git.kernel.org/?p=utils/util-linux-ng/util-linux-ng.git%3Ba=commit%3Bh=8ccf0b253ac0f4f58d64bc9674de18bff5a88782
-
http://www.securityfocus.com/bid/28983
Jump to