CVE-2016-6318
Published: 7 September 2016
Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.
Notes
Author | Note |
---|---|
tyhicks | Ubuntu's chfn limits the total GECOS field length to 84 characters which is well within cracklib2's buffer size of 2048. libpam-cracklib is not part of the default install so PAM cracklib support is not enabled in the majority of Ubuntu installs Ubuntu's /etc/login.defs only allows unprivileged users to set their room number, work phone, and home phone |
Priority
Status
Package | Release | Status |
---|---|---|
cracklib2 Launchpad, Ubuntu, Debian |
hirsute |
Not vulnerable
(2.9.2-3)
|
xenial |
Needed
|
|
kinetic |
Not vulnerable
(2.9.2-3)
|
|
lunar |
Not vulnerable
(2.9.2-3)
|
|
precise |
Ignored
(end of life)
|
|
artful |
Not vulnerable
(2.9.2-3)
|
|
bionic |
Not vulnerable
(2.9.2-3)
|
|
cosmic |
Not vulnerable
(2.9.2-3)
|
|
disco |
Not vulnerable
(2.9.2-3)
|
|
eoan |
Not vulnerable
(2.9.2-3)
|
|
focal |
Not vulnerable
(2.9.2-3)
|
|
groovy |
Not vulnerable
(2.9.2-3)
|
|
impish |
Not vulnerable
(2.9.2-3)
|
|
jammy |
Not vulnerable
(2.9.2-3)
|
|
trusty |
Needed
|
|
upstream |
Needed
|
|
yakkety |
Not vulnerable
(2.9.2-3)
|
|
zesty |
Not vulnerable
(2.9.2-3)
|
|
mantic |
Not vulnerable
(2.9.2-3)
|
|
Patches: upstream: https://bugzilla.redhat.com/attachment.cgi?id=1188599 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |