Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-10963

Опубликовано: 07 нояб. 2024
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

Отчет

This vulnerability in pam_access is rated with an Important severity because it directly impacts the integrity of access control mechanisms in secure environments. By allowing hostname spoofing to bypass restrictions intended for specific local TTYs or services, the vulnerability enables attackers with minimal effort to exploit gaps in security policies that rely on access.conf configurations. The potential for unauthorized access is significant, as attackers with root privileges on any networked device can impersonate trusted service names to evade local access controls. This vulnerability was introduced in RHEL-9.4 and does not affect previous versions of RHEL-9.

Меры по смягчению последствий

To reduce the risk, administrators should ensure that no DNS hostname matches local TTY or service names used in pam_access. Additionally, implement DNSSEC to prevent spoofing of DNS responses. For stronger protection, consider reconfiguring pam_access to only accept fully qualified domain names (FQDNs) in access.conf

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10pamNot affected
Red Hat Enterprise Linux 6pamNot affected
Red Hat Enterprise Linux 7pamNot affected
Red Hat Enterprise Linux 8pamFixedRHSA-2024:1037926.11.2024
Red Hat Enterprise Linux 9pamFixedRHSA-2024:1024425.11.2024
Red Hat Enterprise Linux 9pamFixedRHSA-2024:1024425.11.2024
Red Hat Enterprise Linux 9.4 Extended Update SupportpamFixedRHSA-2024:1023225.11.2024
Red Hat OpenShift Container Platform 4.16rhcos-416.94.202411261619FixedRHSA-2024:1052804.12.2024
Red Hat OpenShift Container Platform 4.17rhcos-417.94.202411261220FixedRHSA-2024:1051803.12.2024
Red Hat OpenShift AI 2.16registry.redhat.io/rhoai/odh-dashboard-rhel8FixedRHSA-2024:1085205.12.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=2324291pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass

EPSS

Процентиль: 39%
0.00167
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
ubuntu
8 месяцев назад

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
nvd
8 месяцев назад

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
msrc
7 месяцев назад

Описание отсутствует

CVSS3: 7.4
debian
8 месяцев назад

A flaw was found in pam_access, where certain rules in its configurati ...

CVSS3: 6.5
github
8 месяцев назад

A vulnerability was found in pam_access due to the improper handling of tokens in access.conf, interpreted as hostnames. This flaw allows attackers to bypass access restrictions by spoofing hostnames, undermining configurations designed to limit access to specific TTYs or services. The flaw poses a risk in environments relying on these configurations for local access control.

EPSS

Процентиль: 39%
0.00167
Низкий

7.4 High

CVSS3