Vulnerabilities
Vulnerable Software
Mark D. Roth:  >> Pam Per User  Security Vulnerabilities
pam_per_user before 0.4 does not verify if the user name changes between authentication attempts and uses the same subrequest handle, which allows remote attackers or local users to login as other users by using certain applications that allow the username to be changed during authentication, such as /bin/login.
CVSS Score
7.5
EPSS Score
0.01
Published
2005-09-16


Contact Us

Shodan ® - All rights reserved