CVE-2008-5394
Summary
| CVE | CVE-2008-5394 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2008-12-09 00:30:00 UTC |
| Updated | 2018-10-11 20:55:00 UTC |
| Description | /bin/login in shadow 4.0.18.1 in Debian GNU/Linux, and probably other Linux distributions, allows local users in the utmp group to overwrite arbitrary files via a symlink attack on a temporary file referenced in a line (aka ut_line) field in a utmp entry. |
Risk And Classification
Problem Types: CWE-59
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Multiple Linux Distributions 'login' Local Privilege Escalation Vulnerability | BID | www.securityfocus.com | |
| #505071 - login tty mis-determination (see bug#332198) - Debian Bug report logs | CONFIRM | bugs.debian.org | |
| USN-695-1: shadow vulnerability | Ubuntu | UBUNTU | www.ubuntu.com | |
| 52200 | OSVDB | osvdb.org | |
| Debian GNU/Linux (symlink attack in login) Arbitrary File Ownership PoC | EXPLOIT-DB | www.exploit-db.com | |
| Support / Security / Advisories / / MDVSA-2009:062 | Mandriva | MANDRIVA | www.mandriva.com | |
| #505271 - symlink attack in login leading to arbitrary file ownership - Debian Bug report logs | CONFIRM | bugs.debian.org | |
| #332198 - login: unable to determine TTY name, got /dev/pts/1 - Debian Bug report logs | CONFIRM | bugs.debian.org | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| /bin/login gives root to group utmp - CXSecurity.com | SREASON | securityreason.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| Gentoo Linux Documentation -- Shadow: Privilege escalation | GENTOO | security.gentoo.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|---|---|---|
| Red Hat | 2008-12-18 | Tomas Hoger | Not vulnerable. This issue did not affect the versions of the util-linux packages (providing /bin/login), as shipped with Red Hat Enterprise Linux 2.1, 3, 4 or 5. |
There are currently no legacy QID mappings associated with this CVE.