Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-10963

Опубликовано: 07 нояб. 2024
Источник: debian
EPSS Низкий

Описание

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pamfixed1.7.0-5package
pamnot-affectedbookwormpackage
pamnot-affectedbullseyepackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2324291

  • https://github.com/linux-pam/linux-pam/issues/834

  • Introduced in https://github.com/linux-pam/linux-pam/commit/23393bef92c1e768eda329813d7af55481c6ca9f (v1.5.3)

  • Mitigated by: https://github.com/linux-pam/linux-pam/commit/940747f88c16e029b69a74e80a2e94f65cb3e628 (v1.7.1)

  • Since pam/1.7.0-5 in Debian unstable backports upstream commit to implement

  • the nodns option to allow people to work around #1087019, even though it doesn't

  • fix the root cause.

EPSS

Процентиль: 41%
0.00185
Низкий

Связанные уязвимости

CVSS3: 7.4
ubuntu
8 месяцев назад

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
redhat
8 месяцев назад

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
nvd
8 месяцев назад

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
msrc
7 месяцев назад

Описание отсутствует

CVSS3: 6.5
github
8 месяцев назад

A vulnerability was found in pam_access due to the improper handling of tokens in access.conf, interpreted as hostnames. This flaw allows attackers to bypass access restrictions by spoofing hostnames, undermining configurations designed to limit access to specific TTYs or services. The flaw poses a risk in environments relying on these configurations for local access control.

EPSS

Процентиль: 41%
0.00185
Низкий