Description
The default configuration of su in /etc/pam.d/su in GNU coreutils 5.2.1 allows local users to gain the privileges of a (1) locked or (2) expired account by entering the account name on the command line, related to improper use of the pam_succeed_if.so module.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2008-1945 | The default configuration of su in /etc/pam.d/su in GNU coreutils 5.2.1 allows local users to gain the privileges of a (1) locked or (2) expired account by entering the account name on the command line, related to improper use of the pam_succeed_if.so module. |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T08:41:00.169Z
Reserved: 2008-04-24T00:00:00.000Z
Link: CVE-2008-1946
No data.
Status : Modified
Published: 2008-07-28T17:41:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2008-1946
OpenCVE Enrichment
No data.
Weaknesses
EUVD