CVE-2008-1628

Published Apr 2, 2008

Last updated 7 years ago

Overview

Description
Stack-based buffer overflow in the audit_log_user_command function in lib/audit_logging.c in Linux Audit before 1.7 might allow remote attackers to execute arbitrary code via a long command argument. NOTE: some of these details are obtained from third party information.
Source
cve@mitre.org
NVD status
Modified

Social media

Hype score
Not currently trending

Risk scores

CVSS 2.0

Type
Primary
Base score
4.1
Impact score
6.4
Exploitability score
2.7
Vector string
AV:L/AC:M/Au:S/C:P/I:P/A:P

Weaknesses

nvd@nist.gov
CWE-119

Evaluator

Comment
Additional information can be found at: http://www.securityfocus.com/bid/28524/info http://www.frsirt.com/english/advisories/2008/1052
Impact
-
Solution
-

Vendor comments

  • Red HatThis issue did not affect the audit packages as shipped with Red Hat Enterprise Linux 4. Red Hat is not treating this issue as a security vulnerability for Red Hat Enterprise Linux 5 as no application used the affected interface, and the only result is a controlled application termination as the overflow is detected by the FORTIFY_SOURCE protection mechanism. We plan to address this as non-security bug fix in updated audit packages for Red Hat Enterprise Linux 5.2. For further details, please see: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-1628

Configurations