Lucene search

K
gentooGentoo FoundationGLSA-201612-25
HistoryDec 08, 2016 - 12:00 a.m.

CrackLib: Buffer overflow

2016-12-0800:00:00
Gentoo Foundation
security.gentoo.org
38

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

Background

CrackLib is a library used to enforce strong passwords by comparing user selected passwords to words in chosen word lists.

Description

A stack-based buffer overflow was discovered in the FascistGecosUser function of lib/fascist.c.

Impact

A local attacker could set a specially crafted GECOS field value in “/etc/passwd”; possibly resulting in the execution of arbitrary code with the privileges of the process, a Denial of Service condition, or the escalation of privileges.

Workaround

There is no known workaround at this time.

Resolution

All CrackLib users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-libs/cracklib-2.9.6-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-libs/cracklib< 2.9.6-r1UNKNOWN

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%