BSD Buffer Overflow Vulnerability

HIGH (7.2) Patch Available Patch Patch

Threat Intelligence

Low Risk
EPSS Score: 0.63% chance of exploitation (percentile: 70%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

The BSD passwd buffer overflow vulnerability is a local privilege escalation issue in the passwd file of older BSD-based operating systems. The passwd file stores user information, including passwords and group memberships. An attacker can exploit this vulnerability by specifying a long shell or GECOS field in the passwd file, allowing them to gain root privileges.

Am I affected?

This vulnerability affects BSD-based operating systems 4.3 and earlier. To check if you're affected, run the following command on your system:

grep -q "long" /etc/passwd

Note that this command checks for a specific string in the passwd file, which may not be present in all systems.

Version info: BSD 4.3 and earlier

Affected Products

BSD Group / BSD

How to fix

To fix this vulnerability, you can apply the patch from CERT (http://www.cert.org/advisories/CA-1989-01.html). Alternatively, you can immediately mitigate the issue by:

  • Restricting access to the passwd file using permissions or other security measures
  • Monitoring system logs for suspicious activity

Please note that this vulnerability is relatively low in terms of exploitation likelihood (EPSS Score: 0.626%), making it a script kiddie-level exploit.