Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-10963

Опубликовано: 07 нояб. 2024
Источник: debian
EPSS Низкий

Описание

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pamfixed1.7.0-5package
pamnot-affectedbookwormpackage
pamnot-affectedbullseyepackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2324291

  • https://github.com/linux-pam/linux-pam/issues/834

  • Introduced in https://github.com/linux-pam/linux-pam/commit/23393bef92c1e768eda329813d7af55481c6ca9f (v1.5.3)

  • Mitigated by: https://github.com/linux-pam/linux-pam/commit/940747f88c16e029b69a74e80a2e94f65cb3e628 (v1.7.1)

  • Since pam/1.7.0-5 in Debian unstable backports upstream commit to implement

  • the nodns option to allow people to work around #1087019, even though it doesn't

  • fix the root cause.

EPSS

Процентиль: 51%
0.00276
Низкий

Связанные уязвимости

CVSS3: 7.4
ubuntu
около 1 года назад

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
redhat
около 1 года назад

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
nvd
около 1 года назад

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
msrc
11 месяцев назад

Описание отсутствует

rocky
8 месяцев назад

Important: pam:1.5.1 security update

EPSS

Процентиль: 51%
0.00276
Низкий