Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2m59-rw4g-9g7x

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Debian shadow package before 4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges.

The Debian shadow package before 4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges.

EPSS

Процентиль: 16%
0.00052
Низкий

Дефекты

CWE-269

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 5 лет назад

The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges.

CVSS3: 7.8
nvd
почти 5 лет назад

The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges.

CVSS3: 7.8
debian
почти 5 лет назад

The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists ...

CVSS3: 7.8
fstec
около 7 лет назад

Уязвимость утилиты для управления учетными записями shadow, связанная с небезопасным управлением привилегиями, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 16%
0.00052
Низкий

Дефекты

CWE-269