Vulnerability Details : CVE-2015-8325
The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.
Products affected by CVE-2015-8325
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:*:p2:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_core:15.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_touch:15.04:*:*:*:*:*:*:*
Threat overview for CVE-2015-8325
Top countries where our scanners detected CVE-2015-8325
Top open port discovered on systems with this issue
22
IPs affected by CVE-2015-8325 3,014,646
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2015-8325!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2015-8325
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 29 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-8325
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2015-8325
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-8325
-
https://security.netapp.com/advisory/ntap-20180628-0001/
CVE-2015-8325 OpenSSH Vulnerability in NetApp Products | NetApp Product Security
-
https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755
openssh.git - Portable OpenSSH
-
http://www.securitytracker.com/id/1036487
OpenSSH Bugs Let Remote Users Deny Service and Obtain Potentially Sensitive Timing Information and Let Local Users Gain Elevated Privileges - SecurityTracker
-
http://rhn.redhat.com/errata/RHSA-2016-2588.html
RHSA-2016:2588 - Security Advisory - Red Hat Customer Portal
-
https://security-tracker.debian.org/tracker/CVE-2015-8325
CVE-2015-8325
-
https://bugzilla.redhat.com/show_bug.cgi?id=1328012
1328012 – (CVE-2015-8325) CVE-2015-8325 openssh: privilege escalation via user's PAM environment and UseLogin=yes
-
http://rhn.redhat.com/errata/RHSA-2017-0641.html
RHSA-2017:0641 - Security Advisory - Red Hat Customer Portal
-
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
-
http://www.securityfocus.com/bid/86187
OpenSSH 'session.c' Local Security Bypass Vulnerability
-
http://www.debian.org/security/2016/dsa-3550
Debian -- Security Information -- DSA-3550-1 openssh
-
https://security.gentoo.org/glsa/201612-18
OpenSSH: Multiple vulnerabilities (GLSA 201612-18) — Gentoo security
-
https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8325.html
CVE-2015-8325 in Ubuntu
Jump to