Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-3176

Опубликовано: 31 янв. 2017
Источник: debian
EPSS Низкий

Описание

Salt before 2015.5.10 and 2015.8.x before 2015.8.8, when PAM external authentication is enabled, allows attackers to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
saltfixed2015.8.8+ds-1package
saltno-dsajessiepackage

Примечания

  • external_auth seems not usable by default under Jessie due to the

  • permissions on /var/run/salt/master.

  • https://docs.saltstack.com/en/latest/topics/releases/2015.8.8.html

  • https://docs.saltstack.com/en/latest/topics/releases/2015.5.10.html

  • https://github.com/saltstack/salt/pull/31826/commits/d73f70ebb289142e4f692359fe741a54f5d2ad65

  • Fixed in 2015.5.10/2015.8.8 upstream

EPSS

Процентиль: 38%
0.00167
Низкий

Связанные уязвимости

CVSS3: 5.6
ubuntu
около 9 лет назад

Salt before 2015.5.10 and 2015.8.x before 2015.8.8, when PAM external authentication is enabled, allows attackers to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient.

redhat
почти 10 лет назад

Salt before 2015.5.10 and 2015.8.x before 2015.8.8, when PAM external authentication is enabled, allows attackers to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient.

CVSS3: 5.6
nvd
около 9 лет назад

Salt before 2015.5.10 and 2015.8.x before 2015.8.8, when PAM external authentication is enabled, allows attackers to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient.

CVSS3: 5.6
github
больше 3 лет назад

Salt Insecure configuration of PAM external authentication service

EPSS

Процентиль: 38%
0.00167
Низкий