Описание
The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | not-affected | 1:4.5-1ubuntu2 |
| devel | not-affected | |
| esm-infra-legacy/trusty | not-affected | |
| esm-infra/bionic | not-affected | 1:4.5-1ubuntu2 |
| esm-infra/focal | not-affected | |
| esm-infra/xenial | not-affected | 1:4.2-3.1ubuntu5.4 |
| focal | not-affected | |
| groovy | not-affected | |
| precise/esm | not-affected | |
| trusty | ignored | end of standard support |
Показывать по
4.6 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges.
The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists ...
The Debian shadow package before 4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges.
Уязвимость утилиты для управления учетными записями shadow, связанная с небезопасным управлением привилегиями, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
4.6 Medium
CVSS2
7.8 High
CVSS3