Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-24032

Опубликовано: 10 фев. 2025
Источник: ubuntu
Приоритет: high
EPSS Низкий

Описание

PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificate based user login. Prior to version 0.6.13, if cert_policy is set to none (the default value), then pam_pkcs11 will only check if the user is capable of logging into the token. An attacker may create a different token with the user's public data (e.g. the user's certificate) and a PIN known to the attacker. If no signature with the private key is required, then the attacker may now login as user with that created token. The default to not check the private key's signature has been changed with commit commi6638576892b59a99389043c90a1e7dd4d783b921, so that all versions starting with pam_pkcs11-0.6.0 should be affected. As a workaround, in pam_pkcs11.conf, set at least cert_policy = signature;.

РелизСтатусПримечание
devel

not-affected

0.6.13-1
esm-apps/bionic

released

0.6.9-2ubuntu0.1~esm1
esm-apps/focal

released

0.6.11-2ubuntu0.1
esm-apps/jammy

released

0.6.11-4ubuntu0.1
esm-apps/noble

released

0.6.12-2ubuntu0.24.04.1
esm-apps/xenial

released

0.6.8-4ubuntu0.1~esm1
focal

released

0.6.11-2ubuntu0.1
jammy

released

0.6.11-4ubuntu0.1
noble

released

0.6.12-2ubuntu0.24.04.1
oracular

released

0.6.12-2ubuntu0.24.10.1

Показывать по

EPSS

Процентиль: 50%
0.00265
Низкий

Связанные уязвимости

CVSS3: 8
redhat
6 месяцев назад

PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificate based user login. Prior to version 0.6.13, if cert_policy is set to none (the default value), then pam_pkcs11 will only check if the user is capable of logging into the token. An attacker may create a different token with the user's public data (e.g. the user's certificate) and a PIN known to the attacker. If no signature with the private key is required, then the attacker may now login as user with that created token. The default to *not* check the private key's signature has been changed with commit commi6638576892b59a99389043c90a1e7dd4d783b921, so that all versions starting with pam_pkcs11-0.6.0 should be affected. As a workaround, in `pam_pkcs11.conf`, set at least `cert_policy = signature;`.

nvd
6 месяцев назад

PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificate based user login. Prior to version 0.6.13, if cert_policy is set to none (the default value), then pam_pkcs11 will only check if the user is capable of logging into the token. An attacker may create a different token with the user's public data (e.g. the user's certificate) and a PIN known to the attacker. If no signature with the private key is required, then the attacker may now login as user with that created token. The default to *not* check the private key's signature has been changed with commit commi6638576892b59a99389043c90a1e7dd4d783b921, so that all versions starting with pam_pkcs11-0.6.0 should be affected. As a workaround, in `pam_pkcs11.conf`, set at least `cert_policy = signature;`.

debian
6 месяцев назад

PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificat ...

CVSS3: 8
redos
29 дней назад

Уязвимость pam_pkcs11

CVSS3: 10
fstec
6 месяцев назад

Уязвимость модуля аутентификации PAM-PKCS#11 операционных систем Linux, позволяющая нарушителю обойти процесс аутентификации

EPSS

Процентиль: 50%
0.00265
Низкий