Описание
The PAM implementation in /bin/login of the util-linux package before 2.11 causes a password entry to be rewritten across multiple PAM calls, which could provide the credentials of one user to a different user, when used in certain PAM modules such as pam_limits.
The PAM implementation in /bin/login of the util-linux package before 2.11 causes a password entry to be rewritten across multiple PAM calls, which could provide the credentials of one user to a different user, when used in certain PAM modules such as pam_limits.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2001-1147
- http://www.ciac.org/ciac/bulletins/m-009.shtml
- http://www.iss.net/security_center/static/7266.php
- http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-084.php3
- http://www.novell.com/linux/security/advisories/2001_034_shadow_txt.html
- http://www.redhat.com/support/errata/RHSA-2001-132.html
- http://www.securityfocus.com/archive/1/219175
- http://www.securityfocus.com/bid/3415
EPSS
CVE ID
Связанные уязвимости
The PAM implementation in /bin/login of the util-linux package before 2.11 causes a password entry to be rewritten across multiple PAM calls, which could provide the credentials of one user to a different user, when used in certain PAM modules such as pam_limits.
The PAM implementation in /bin/login of the util-linux package before 2.11 causes a password entry to be rewritten across multiple PAM calls, which could provide the credentials of one user to a different user, when used in certain PAM modules such as pam_limits.
Уязвимости операционной системы Red Hat Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS