// For flags

CVE-2015-3245

Libuser Library - Multiple Vulnerabilities

Severity Score

2.1
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Incomplete blacklist vulnerability in the chfn function in libuser before 0.56.13-8 and 0.60 before 0.60-7, as used in the userhelper program in the usermode package, allows local users to cause a denial of service (/etc/passwd corruption) via a newline character in the GECOS field.

Vulnerabilidad de lista negra incompleta en la función chfn en libuser en versiones anteriores a 0.56.13-8 y 0.60 en versiones anteriores a 0.60-7, tal como se utiliza en el programa userhelp en el paquete usermode, permite a usuarios locales provocar una denegación de servicio (/etc/passwd corruption) a través de un caracter de nueva línea en el campo GECOS.

It was found that libuser, as used by the chfn userhelper functionality, did not properly filter out newline characters in GECOS fields. A local, authenticated user could use this flaw to corrupt the /etc/passwd file, resulting in a denial-of-service on the system.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
Attack Vector
Local
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-04-10 CVE Reserved
  • 2015-07-23 CVE Published
  • 2015-07-27 First Exploit
  • 2023-03-08 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
  • CWE-138: Improper Neutralization of Special Elements
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Redhat
Search vendor "Redhat"
Libuser
Search vendor "Redhat" for product "Libuser"
<= 0.56.13-5
Search vendor "Redhat" for product "Libuser" and version " <= 0.56.13-5"
-
Affected
Redhat
Search vendor "Redhat"
Libuser
Search vendor "Redhat" for product "Libuser"
0.60-1
Search vendor "Redhat" for product "Libuser" and version "0.60-1"
-
Affected
Redhat
Search vendor "Redhat"
Libuser
Search vendor "Redhat" for product "Libuser"
0.60-2
Search vendor "Redhat" for product "Libuser" and version "0.60-2"
-
Affected
Redhat
Search vendor "Redhat"
Libuser
Search vendor "Redhat" for product "Libuser"
0.60-3
Search vendor "Redhat" for product "Libuser" and version "0.60-3"
-
Affected
Redhat
Search vendor "Redhat"
Libuser
Search vendor "Redhat" for product "Libuser"
0.60-4
Search vendor "Redhat" for product "Libuser" and version "0.60-4"
-
Affected
Redhat
Search vendor "Redhat"
Libuser
Search vendor "Redhat" for product "Libuser"
0.60-5
Search vendor "Redhat" for product "Libuser" and version "0.60-5"
-
Affected
Redhat
Search vendor "Redhat"
Libuser
Search vendor "Redhat" for product "Libuser"
0.60-6
Search vendor "Redhat" for product "Libuser" and version "0.60-6"
-
Affected