Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-2516

Опубликовано: 03 июн. 2008
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.6

Описание

pam_sm_authenticate in pam_pgsql.c in libpam-pgsql 0.6.3 does not properly consider operator precedence when evaluating the success of a pam_get_pass function call, which allows local users to gain privileges via a SIGINT signal when this function is executing, as demonstrated by a CTRL-C sequence at a sudo password prompt in an "auth sufficient pam_pgsql.so" configuration.

РелизСтатусПримечание
dapper

ignored

end of life
devel

released

0.6.3-2build1
feisty

ignored

end of life, was needed
gutsy

released

0.6.3-0ubuntu1.7.10.1
hardy

released

0.6.3-0ubuntu1.8.04.1
intrepid

released

0.6.3-2build1
jaunty

released

0.6.3-2build1
karmic

released

0.6.3-2build1
upstream

released

0.6.3-2

Показывать по

Ссылки на источники

EPSS

Процентиль: 18%
0.00058
Низкий

4.6 Medium

CVSS2

Связанные уязвимости

nvd
больше 17 лет назад

pam_sm_authenticate in pam_pgsql.c in libpam-pgsql 0.6.3 does not properly consider operator precedence when evaluating the success of a pam_get_pass function call, which allows local users to gain privileges via a SIGINT signal when this function is executing, as demonstrated by a CTRL-C sequence at a sudo password prompt in an "auth sufficient pam_pgsql.so" configuration.

debian
больше 17 лет назад

pam_sm_authenticate in pam_pgsql.c in libpam-pgsql 0.6.3 does not prop ...

github
больше 3 лет назад

pam_sm_authenticate in pam_pgsql.c in libpam-pgsql 0.6.3 does not properly consider operator precedence when evaluating the success of a pam_get_pass function call, which allows local users to gain privileges via a SIGINT signal when this function is executing, as demonstrated by a CTRL-C sequence at a sudo password prompt in an "auth sufficient pam_pgsql.so" configuration.

EPSS

Процентиль: 18%
0.00058
Низкий

4.6 Medium

CVSS2