Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-2977

Опубликовано: 01 нояб. 2005
Источник: debian
EPSS Низкий

Описание

The SELinux version of PAM before 0.78 r3 allows local users to perform brute force password guessing attacks via unix_chkpwd, which does not log failed guesses or delay its responses.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pamfixed0.99.7.1-2package
pamfixed0.79-5etchpackage
pamnot-affectedsargepackage
pamnot-affectedwoodypackage

EPSS

Процентиль: 23%
0.00076
Низкий

Связанные уязвимости

ubuntu
почти 20 лет назад

The SELinux version of PAM before 0.78 r3 allows local users to perform brute force password guessing attacks via unix_chkpwd, which does not log failed guesses or delay its responses.

redhat
почти 20 лет назад

The SELinux version of PAM before 0.78 r3 allows local users to perform brute force password guessing attacks via unix_chkpwd, which does not log failed guesses or delay its responses.

nvd
почти 20 лет назад

The SELinux version of PAM before 0.78 r3 allows local users to perform brute force password guessing attacks via unix_chkpwd, which does not log failed guesses or delay its responses.

github
больше 3 лет назад

The SELinux version of PAM before 0.78 r3 allows local users to perform brute force password guessing attacks via unix_chkpwd, which does not log failed guesses or delay its responses.

EPSS

Процентиль: 23%
0.00076
Низкий