Lucene search

K

Pam Security Vulnerabilities

cve
cve

CVE-2024-22365

linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks...

5.5CVSS

6.8AI Score

0.0004EPSS

2024-02-06 08:15 AM
41
cve
cve

CVE-2022-28321

The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a...

9.8CVSS

9.3AI Score

0.002EPSS

2022-09-19 10:15 PM
69
6
cve
cve

CVE-2021-31924

Yubico pam-u2f before 1.1.1 has a logic issue that, depending on the pam-u2f configuration and the application used, could lead to a local PIN bypass. This issue does not allow user presence (touch) or cryptographic signature verification to be bypassed, so an attacker would still need to...

6.8CVSS

6.4AI Score

0.001EPSS

2021-05-26 12:15 AM
149
6
cve
cve

CVE-2020-27780

A flaw was found in Linux-Pam in versions prior to 1.5.1 in the way it handle empty passwords for non-existing users. When the user doesn't exist PAM try to authenticate with root and in the case of an empty password it successfully...

9.8CVSS

9.2AI Score

0.002EPSS

2020-12-18 12:15 AM
84
3
cve
cve

CVE-2020-10595

pam-krb5 before 4.9 has a buffer overflow that might cause remote code execution in situations involving supplemental prompting by a Kerberos library. It may overflow a buffer provided by the underlying Kerberos library by a single '\0' byte if an attacker responds to a prompt with an answer of a.....

9.8CVSS

9.9AI Score

0.043EPSS

2020-03-31 01:15 PM
50
cve
cve

CVE-2011-4120

Yubico PAM Module before 2.10 performed user authentication when 'use_first_pass' PAM configuration option was not used and the module was configured as 'sufficient' in the PAM configuration. A remote attacker could use this flaw to circumvent common authentication process and obtain access to the....

9.8CVSS

9.3AI Score

0.015EPSS

2019-11-26 05:15 AM
63
cve
cve

CVE-2012-2350

pam_shield before 0.9.4: Default configuration does not perform protective...

7.5CVSS

7.5AI Score

0.003EPSS

2019-11-21 02:15 PM
21
cve
cve

CVE-2019-16729

pam-python before 1.0.7-1 has an issue in regard to the default environment variable handling of Python, which could allow for local root escalation in certain PAM...

7.8CVSS

7.5AI Score

0.0004EPSS

2019-09-24 05:15 AM
100
cve
cve

CVE-2019-12210

In Yubico pam-u2f 1.0.7, when configured with debug and a custom debug log file is set using debug_file, that file descriptor is not closed when a new process is spawned. This leads to the file descriptor being inherited into the child process; the child process can then read from and write to it.....

8.1CVSS

7.7AI Score

0.002EPSS

2019-06-04 09:29 PM
291
cve
cve

CVE-2019-12209

Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root. If the debug option is enabled in the PAM....

7.5CVSS

7.3AI Score

0.016EPSS

2019-06-04 09:29 PM
311
cve
cve

CVE-2019-10319

A missing permission check in Jenkins PAM Authentication Plugin 1.5 and earlier, except 1.4.1 in PamSecurityRealm.DescriptorImpl#doTest allowed users with Overall/Read permission to obtain limited information about the file /etc/shadow and the user Jenkins is running...

4.3CVSS

6.7AI Score

0.001EPSS

2019-05-21 01:29 PM
27
cve
cve

CVE-2018-17953

A incorrect variable in a SUSE specific patch for pam_access rule matching in PAM 1.3.0 in openSUSE Leap 15.0 and SUSE Linux Enterprise 15 could lead to pam_access rules not being applied (fail...

8.1CVSS

7.8AI Score

0.002EPSS

2018-11-27 01:29 PM
26
cve
cve

CVE-2018-1343

PAM exposure enabling unauthenticated access to remote...

9.8CVSS

7.6AI Score

0.003EPSS

2018-03-06 08:29 PM
22
cve
cve

CVE-2015-3238

The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large...

6.5CVSS

6.1AI Score

0.009EPSS

2015-08-24 02:59 PM
77
cve
cve

CVE-2014-2583

Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to...

6.7AI Score

0.003EPSS

2014-04-10 08:29 PM
47
cve
cve

CVE-2013-0288

nss-pam-ldapd before 0.7.18 and 0.8.x before 0.8.11 allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code by performing a name lookup on an application with a large number of open file descriptors, which triggers a stack-based...

7.6AI Score

0.004EPSS

2013-03-05 09:38 PM
46
cve
cve

CVE-2011-3148

Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment...

7.2AI Score

0.0004EPSS

2012-07-22 05:55 PM
45
cve
cve

CVE-2011-3149

The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU...

5.7AI Score

0.0004EPSS

2012-07-22 05:55 PM
44
cve
cve

CVE-2011-0438

nslcd/pam.c in the nss-pam-ldapd 0.8.0 PAM module returns a success code when a user is not found in LDAP, which allows remote attackers to bypass...

7AI Score

0.016EPSS

2011-03-15 05:55 PM
30
cve
cve

CVE-2010-4708

The pam_env module in Linux-PAM (aka pam) 1.1.2 and earlier reads the .pam_environment file in a user's home directory, which might allow local users to run programs with an unintended environment by executing a program that relies on the pam_env PAM...

6.1AI Score

0.0004EPSS

2011-01-24 07:00 PM
27
cve
cve

CVE-2010-4706

The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not properly handle a failure to determine a certain target uid, which might allow local users to delete unintended files by executing a program that relies on the pam_xauth PAM...

6AI Score

0.0004EPSS

2011-01-24 07:00 PM
29
cve
cve

CVE-2010-4707

The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special...

5.9AI Score

0.0004EPSS

2011-01-24 07:00 PM
26
cve
cve

CVE-2010-3316

The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM...

5.8AI Score

0.0004EPSS

2011-01-24 06:00 PM
34
cve
cve

CVE-2010-3853

pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace...

6.2AI Score

0.0004EPSS

2011-01-24 06:00 PM
30
cve
cve

CVE-2010-3431

The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not check the return value of the setfsuid system call, which might allow local users to obtain sensitive information by leveraging an unintended uid, as demonstrated by a symlink...

5.6AI Score

0.0004EPSS

2011-01-24 06:00 PM
33
cve
cve

CVE-2010-3435

The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated....

5.5AI Score

0.0004EPSS

2011-01-24 06:00 PM
49
cve
cve

CVE-2010-3430

The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as...

5.6AI Score

0.0004EPSS

2011-01-24 06:00 PM
30
cve
cve

CVE-2009-1384

pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid...

6.7AI Score

0.007EPSS

2009-05-28 08:30 PM
26
cve
cve

CVE-2009-0579

Linux-PAM before 1.0.4 does not enforce the minimum password age (MINDAYS) as specified in /etc/shadow, which allows local users to bypass intended security policy and change their passwords sooner than...

6.6AI Score

0.0004EPSS

2009-04-16 03:12 PM
30
cve
cve

CVE-2009-0887

Integer signedness error in the _pam_StrTok function in libpam/pam_misc.c in Linux-PAM (aka pam) 1.0.3 and earlier, when a configuration file contains non-ASCII usernames, might allow remote attackers to cause a denial of service, and might allow remote authenticated users to obtain login access...

6.1AI Score

0.004EPSS

2009-03-12 03:20 PM
31
cve
cve

CVE-2009-0360

Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid.....

8.7AI Score

0.0004EPSS

2009-02-13 05:30 PM
31
cve
cve

CVE-2009-0361

Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable,...

8.6AI Score

0.0004EPSS

2009-02-13 05:30 PM
33
cve
cve

CVE-2006-0056

Double free vulnerability in the authentication and authentication token alteration code in PAM-MySQL 0.6.x before 0.6.2 and 0.7.x before 0.7pre3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted passwords, which lead to a...

8AI Score

0.276EPSS

2006-02-13 11:06 AM
19
cve
cve

CVE-2005-2977

The SELinux version of PAM before 0.78 r3 allows local users to perform brute force password guessing attacks via unix_chkpwd, which does not log failed guesses or delay its...

6.2AI Score

0.0004EPSS

2005-11-01 12:47 PM
26
cve
cve

CVE-2004-0366

SQL injection vulnerability in the libpam-pgsql library before 0.5.2 allows attackers to execute arbitrary SQL...

8.1AI Score

0.004EPSS

2004-05-04 04:00 AM
38
cve
cve

CVE-2003-0672

Format string vulnerability in pam-pgsql 0.5.2 and earlier allows remote attackers to execute arbitrary code via the username that isp rovided during authentication, which is not properly handled when recording a log...

7.6AI Score

0.004EPSS

2003-08-27 04:00 AM
29
cve
cve

CVE-2002-1227

PAM 0.76 treats a disabled password as if it were an empty (null) password, which allows local and remote attackers to gain privileges as disabled...

7.1AI Score

0.008EPSS

2002-10-28 05:00 AM
27
cve
cve

CVE-2001-1369

Leon J Breedt pam-pgsql before 0.5.2 allows remote attackers to execute arbitrary SQL code and bypass authentication or modify user account records by injecting SQL statements into user or password...

9.3AI Score

0.007EPSS

2001-09-10 04:00 AM
21
cve
cve

CVE-1999-0342

Linux PAM modules allow local users to gain root access using temporary...

7.4AI Score

0.0004EPSS

1998-12-01 05:00 AM
30
2