Linux-pam

Linux-pam

20 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 17.06.2025 12:44:08
  • Zuletzt bearbeitet 23.09.2025 20:15:33

A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.

  • EPSS 0.28%
  • Veröffentlicht 07.11.2024 16:15:17
  • Zuletzt bearbeitet 06.02.2025 06:15:29

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue...

  • EPSS 0.03%
  • Veröffentlicht 23.10.2024 14:15:03
  • Zuletzt bearbeitet 18.12.2024 10:15:05

A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predicto...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 06.02.2024 08:15:52
  • Zuletzt bearbeitet 05.06.2025 17:15:27

linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.

  • EPSS 0.11%
  • Veröffentlicht 19.09.2022 22:15:10
  • Zuletzt bearbeitet 29.05.2025 16:15:27

The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In suc...

  • EPSS 0.44%
  • Veröffentlicht 18.12.2020 00:15:14
  • Zuletzt bearbeitet 21.11.2024 05:21:49

A flaw was found in Linux-Pam in versions prior to 1.5.1 in the way it handle empty passwords for non-existing users. When the user doesn't exist PAM try to authenticate with root and in the case of an empty password it successfully authenticate.

Exploit
  • EPSS 3.61%
  • Veröffentlicht 24.08.2015 14:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.

Exploit
  • EPSS 0.69%
  • Veröffentlicht 10.04.2014 20:29:20
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to t...

  • EPSS 0.16%
  • Veröffentlicht 22.07.2012 17:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces ...

  • EPSS 0.06%
  • Veröffentlicht 22.07.2012 17:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consu...