Ask the Community
Groups
CVE-2015-8325: openssh privilege escalation via LD_PRELOAD - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="summary"><strong>SUMMARY</strong></h3> <p>Resolved with later openssh rpm in security update.</p> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2015-8325</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p>The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.</p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p>Fixed in openssh-5.3p1-122.el6 with Unitrends security updates from 04/25/2017 and later.</p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=http%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2015-8325%250D%250Ahttps%3A%2F%2Fbugzilla.redhat.com%2Fshow_bug.cgi%3Fid%3D1328012%25C2%25A0%250D%250Ahttps%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2015-8325%250D%250Ahttps%3A%2F%2Frhn.redhat.com%2Ferrata%2FRHSA-2017-0641.html%25C2%25A0">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325 https://bugzilla.redhat.com/show_bug.cgi?id=1328012 https://access.redhat.com/security/cve/CVE-2015-8325 https://rhn.redhat.com/errata/RHSA-2017-0641.html </a></li></ul> </article> </main>