Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-3176

Опубликовано: 31 янв. 2017
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 4.3
CVSS3: 5.6

Описание

Salt before 2015.5.10 and 2015.8.x before 2015.8.8, when PAM external authentication is enabled, allows attackers to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient.

РелизСтатусПримечание
artful

not-affected

bionic

not-affected

cosmic

not-affected

devel

DNE

disco

not-affected

esm-apps/bionic

not-affected

esm-apps/jammy

not-affected

esm-apps/xenial

not-affected

2015.8.8+ds-1
esm-infra-legacy/trusty

needed

esm-infra/focal

DNE

Показывать по

EPSS

Процентиль: 38%
0.00167
Низкий

4.3 Medium

CVSS2

5.6 Medium

CVSS3

Связанные уязвимости

redhat
почти 10 лет назад

Salt before 2015.5.10 and 2015.8.x before 2015.8.8, when PAM external authentication is enabled, allows attackers to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient.

CVSS3: 5.6
nvd
около 9 лет назад

Salt before 2015.5.10 and 2015.8.x before 2015.8.8, when PAM external authentication is enabled, allows attackers to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient.

CVSS3: 5.6
debian
около 9 лет назад

Salt before 2015.5.10 and 2015.8.x before 2015.8.8, when PAM external ...

CVSS3: 5.6
github
больше 3 лет назад

Salt Insecure configuration of PAM external authentication service

EPSS

Процентиль: 38%
0.00167
Низкий

4.3 Medium

CVSS2

5.6 Medium

CVSS3