Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-27743

Опубликовано: 26 окт. 2020
Источник: debian
EPSS Низкий

Описание

libtac in pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-random/predictable session_id.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libpam-tacplusnot-affectedpackage

Примечания

  • https://github.com/kravietz/pam_tacplus/pull/163

  • https://github.com/kravietz/pam_tacplus/security/advisories/GHSA-rp3p-jm35-jv76

  • Introduced with: https://github.com/kravietz/pam_tacplus/commit/6fac2504657b8d98fcd627d60ebdbffcf0253b81 (v1.5.0-beta.1)

  • Fixed by: https://github.com/kravietz/pam_tacplus/commit/c9bed7496e81e550ee22746f23bbb11be2e046ed (v1.6.1)

  • Fixed by: https://github.com/kravietz/pam_tacplus/commit/bceaab0cd51a09b88f40f19da799ac7390264bf8 (v1.6.1)

EPSS

Процентиль: 68%
0.00567
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 5 лет назад

libtac in pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-random/predictable session_id.

CVSS3: 9.8
nvd
больше 5 лет назад

libtac in pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-random/predictable session_id.

EPSS

Процентиль: 68%
0.00567
Низкий