Vulnerabilities
Vulnerable Software
Linux-Pam:  >> Linux-Pam  >> 0.76  Security Vulnerabilities
The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.
CVSS Score
3.3
EPSS Score
0.001
Published
2011-01-24
Linux-PAM before 1.0.4 does not enforce the minimum password age (MINDAYS) as specified in /etc/shadow, which allows local users to bypass intended security policy and change their passwords sooner than specified.
CVSS Score
4.6
EPSS Score
0.001
Published
2009-04-16
Integer signedness error in the _pam_StrTok function in libpam/pam_misc.c in Linux-PAM (aka pam) 1.0.3 and earlier, when a configuration file contains non-ASCII usernames, might allow remote attackers to cause a denial of service, and might allow remote authenticated users to obtain login access with a different user's non-ASCII username, via a login attempt.
CVSS Score
6.6
EPSS Score
0.002
Published
2009-03-12


Contact Us

Shodan ® - All rights reserved