Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-10963

Опубликовано: 07 нояб. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.4

Описание

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

РелизСтатусПримечание
devel

needed

esm-infra-legacy/trusty

not-affected

see notes
esm-infra/bionic

not-affected

see notes
esm-infra/focal

not-affected

see notes
esm-infra/xenial

not-affected

see notes
focal

not-affected

see notes
jammy

not-affected

see notes
noble

needed

oracular

needed

plucky

needed

Показывать по

EPSS

Процентиль: 40%
0.00181
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
redhat
8 месяцев назад

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
nvd
8 месяцев назад

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CVSS3: 7.4
msrc
7 месяцев назад

Описание отсутствует

CVSS3: 7.4
debian
8 месяцев назад

A flaw was found in pam_access, where certain rules in its configurati ...

CVSS3: 6.5
github
8 месяцев назад

A vulnerability was found in pam_access due to the improper handling of tokens in access.conf, interpreted as hostnames. This flaw allows attackers to bypass access restrictions by spoofing hostnames, undermining configurations designed to limit access to specific TTYs or services. The flaw poses a risk in environments relying on these configurations for local access control.

EPSS

Процентиль: 40%
0.00181
Низкий

7.4 High

CVSS3