Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f5j9-mgc7-gfx4

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

pam_sm_authenticate in pam_pgsql.c in libpam-pgsql 0.6.3 does not properly consider operator precedence when evaluating the success of a pam_get_pass function call, which allows local users to gain privileges via a SIGINT signal when this function is executing, as demonstrated by a CTRL-C sequence at a sudo password prompt in an "auth sufficient pam_pgsql.so" configuration.

pam_sm_authenticate in pam_pgsql.c in libpam-pgsql 0.6.3 does not properly consider operator precedence when evaluating the success of a pam_get_pass function call, which allows local users to gain privileges via a SIGINT signal when this function is executing, as demonstrated by a CTRL-C sequence at a sudo password prompt in an "auth sufficient pam_pgsql.so" configuration.

EPSS

Процентиль: 18%
0.00058
Низкий

Дефекты

CWE-287

Связанные уязвимости

ubuntu
больше 17 лет назад

pam_sm_authenticate in pam_pgsql.c in libpam-pgsql 0.6.3 does not properly consider operator precedence when evaluating the success of a pam_get_pass function call, which allows local users to gain privileges via a SIGINT signal when this function is executing, as demonstrated by a CTRL-C sequence at a sudo password prompt in an "auth sufficient pam_pgsql.so" configuration.

nvd
больше 17 лет назад

pam_sm_authenticate in pam_pgsql.c in libpam-pgsql 0.6.3 does not properly consider operator precedence when evaluating the success of a pam_get_pass function call, which allows local users to gain privileges via a SIGINT signal when this function is executing, as demonstrated by a CTRL-C sequence at a sudo password prompt in an "auth sufficient pam_pgsql.so" configuration.

debian
больше 17 лет назад

pam_sm_authenticate in pam_pgsql.c in libpam-pgsql 0.6.3 does not prop ...

EPSS

Процентиль: 18%
0.00058
Низкий

Дефекты

CWE-287