{"id":"CVE-2016-4484","details":"The Debian initrd script for the cryptsetup package 2:1.7.3-2 and earlier allows physically proximate attackers to gain shell access via many log in attempts with an invalid password.","modified":"2026-04-10T03:51:24.425056Z","published":"2017-01-23T21:59:01.533Z","references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/94315"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/11/14/13"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/11/15/1"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/11/15/4"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/11/16/6"},{"type":"FIX","url":"https://gitlab.com/cryptsetup/cryptsetup/commit/ef8a7d82d8d3716ae9b58179590f7908981fa0cb"},{"type":"EVIDENCE","url":"http://hmarco.org/bugs/CVE-2016-4484/CVE-2016-4484_cryptsetup_initrd_shell.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/cryptsetup/cryptsetup","events":[{"introduced":"0"},{"fixed":"ef8a7d82d8d3716ae9b58179590f7908981fa0cb"}]},{"type":"GIT","repo":"https://gitlab.com/cryptsetup/cryptsetup","events":[{"introduced":"0"},{"fixed":"ef8a7d82d8d3716ae9b58179590f7908981fa0cb"}]}],"versions":["v1_4_2","v1_5_0","v1_5_1","v1_6_0","v1_6_1","v1_6_2","v1_6_3","v1_6_4","v1_6_5","v1_6_6","v1_6_7","v1_6_8","v1_7_0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2.1.7.3-2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-4484.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}