{ "schema_version": "1.4.0", "id": "GHSA-c8wm-gxf7-x75p", "modified": "2022-05-01T23:41:56Z", "published": "2022-05-01T23:41:56Z", "aliases": [ "CVE-2008-1628" ], "details": "Stack-based buffer overflow in the audit_log_user_command function in lib/audit_logging.c in Linux Audit before 1.7 might allow remote attackers to execute arbitrary code via a long command argument. NOTE: some of these details are obtained from third party information.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1628" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41576" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00200.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/linux-audit/2008-March/msg00138.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" }, { "type": "WEB", "url": "http://people.redhat.com/sgrubb/audit/ChangeLog" }, { "type": "WEB", "url": "http://secunia.com/advisories/29617" }, { "type": "WEB", "url": "http://secunia.com/advisories/29754" }, { "type": "WEB", "url": "http://secunia.com/advisories/29957" }, { "type": "WEB", "url": "http://secunia.com/advisories/31316" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200807-14.xml" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:083" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/28524" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1019824" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/1052/references" } ], "database_specific": { "cwe_ids": [ "CWE-119" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-04-02T17:44:00Z" } }