Vulnerability Details : CVE-2008-1926
Argument injection vulnerability in login (login-utils/login.c) in util-linux-ng 2.14 and earlier makes it easier for remote attackers to hide activities by modifying portions of log events, as demonstrated by appending an "addr=" statement to the login name, aka "audit log injection."
Exploit prediction scoring system (EPSS) score for CVE-2008-1926
Probability of exploitation activity in the next 30 days: 1.22%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 84 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-1926
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2008-1926
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2008-1926
-
Red Hat 2009-05-18Red Hat is aware of this issue affecting Red Hat Enterprise Linux 5 and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-1926 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. This issue has been addressed in Red Hat Enterprise Linux 4 with the following update: https://rhn.redhat.com/errata/RHSA-2009-0981.html
-
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00624.html
-
http://www.redhat.com/support/errata/RHSA-2009-0981.html
-
http://www.securitytracker.com/id?1022256
-
http://www.vupen.com/english/advisories/2008/1392/references
-
http://git.kernel.org/?p=utils/util-linux-ng/util-linux-ng.git%3Ba=blobdiff%3Bf=login-utils/login.c%3Bh=230121316d953c59e7842c1325f6e9f326a37608%3Bhp=aad27794327c60391b5148b367d2c79338fc6ee4%3Bhb=8ccf0b253ac0f4f58d64bc9674de18bff5a88782%3Bhpb=3a4a13b12a8065b0b5354686d2807cce421a9973
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9833
-
http://www.securityfocus.com/archive/1/507854/100/0/threaded
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41987
-
http://wiki.rpath.com/Advisories:rPSA-2009-0143
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:114
-
http://git.kernel.org/?p=utils/util-linux-ng/util-linux-ng.git%3Ba=commit%3Bh=8ccf0b253ac0f4f58d64bc9674de18bff5a88782
-
http://www.securityfocus.com/bid/28983
- cpe:2.3:a:linux:util-linux:2.14:rc1:*:*:*:*:*:*
- cpe:2.3:a:linux:util-linux:2.13:*:*:*:*:*:*:*
- cpe:2.3:a:linux:util-linux:2.13.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:linux:util-linux:2.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:linux:util-linux:2.13.1.1:*:*:*:*:*:*:*