pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because, in the context of PAM code running as root, it mishandles usersfile access, such as by calling fchown in the presence of a symlink.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Nov 2024 12:00:00 +0000
Wed, 09 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Nongnu
Nongnu oath Toolkit |
|
CPEs | cpe:2.3:a:nongnu:oath_toolkit:*:*:*:*:*:*:*:* | |
Vendors & Products |
Nongnu
Nongnu oath Toolkit |
|
Metrics |
ssvc
|
Wed, 09 Oct 2024 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in a PAM module, the oath-toolkit. The module gained a feature that allowed placing the OTP state file, called the usersfile, in the home directory of the to-be-authenticated user. The PAM module performed unsafe file operations in the users' home directories. Since PAM stacks typically run as root, this flaw allows a malicious user to jeopardize an environment. | pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because, in the context of PAM code running as root, it mishandles usersfile access, such as by calling fchown in the presence of a symlink. |
References |
|
|
Tue, 08 Oct 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | A vulnerability was found in a PAM module, the oath-toolkit. The module gained a feature that allowed placing the OTP state file, called the usersfile, in the home directory of the to-be-authenticated user. The PAM module performed unsafe file operations in the users' home directories. Since PAM stacks typically run as root, this flaw allows a malicious user to jeopardize an environment. |
Sat, 05 Oct 2024 01:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | |
Title | oath-toolkit: Local root exploit in a PAM module | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-10-09T00:00:00
Updated: 2024-10-18T03:08:08.622Z
Reserved: 2024-09-20T00:00:00
Link: CVE-2024-47191
Vulnrichment
Updated: 2024-10-18T03:08:08.622Z
NVD
Status : Awaiting Analysis
Published: 2024-10-09T05:15:13.420
Modified: 2024-11-21T09:39:30.360
Link: CVE-2024-47191
Redhat