6.4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:N/A:P
8.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
0.001 Low
EPSS
Percentile
46.8%
In check_user_token in util.c in the Yubico PAM module (aka pam_yubico)
2.18 through 2.25, successful logins can leak file descriptors to the auth
mapping file, which can lead to information disclosure (serial number of a
device) and/or DoS (reaching the maximum number of file descriptors).
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | yubico-pam | < any | UNKNOWN |
ubuntu | 16.04 | noarch | yubico-pam | < any | UNKNOWN |
bugzilla.opensuse.org/show_bug.cgi?id=1088027
github.com/Yubico/yubico-pam/commit/0f6ceabab0a8849b47f67d727aa526c2656089ba
github.com/Yubico/yubico-pam/issues/136
launchpad.net/bugs/cve/CVE-2018-9275
nvd.nist.gov/vuln/detail/CVE-2018-9275
security-tracker.debian.org/tracker/CVE-2018-9275
www.cve.org/CVERecord?id=CVE-2018-9275
6.4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:N/A:P
8.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
0.001 Low
EPSS
Percentile
46.8%