CVE-2015-8325

7.8 HIGH
Published: May 01, 2016 Modified: May 06, 2026
View on NVD

Description

The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2588.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://rhn.redhat.com/errata/RHSA-2017-0641.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2016/dsa-3550
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/86187
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id/1036487
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=1328012
Source: af854a3a-2127-422b-91ae-364da2661108
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
https://security-tracker.debian.org/tracker/CVE-2015-8325
Source: af854a3a-2127-422b-91ae-364da2661108
https://security.gentoo.org/glsa/201612-18
Source: af854a3a-2127-422b-91ae-364da2661108
https://security.netapp.com/advisory/ntap-20180628-0001/
Source: af854a3a-2127-422b-91ae-364da2661108

24 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.8 / 10.0
EPSS (Exploit Probability)
0.1%
25th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

openbsd canonical debian