Vulnerability Name: | CVE-2006-7108 (CCN-34844) | ||||||||||||
Assigned: | 2006-01-09 | ||||||||||||
Published: | 2006-01-09 | ||||||||||||
Updated: | 2017-10-11 | ||||||||||||
Summary: | login in util-linux-2.12a skips pam_acct_mgmt and chauth_tok when authentication is skipped, such as when a Kerberos krlogin session has been established, which might allow users to bypass intended access policies that would be enforced by pam_acct_mgmt and chauth_tok. | ||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 4.1 Medium (CVSS v2 Vector: AV:L/AC:M/Au:S/C:P/I:P/A:P) 3.0 Low (Temporal CVSS v2 Vector: AV:L/AC:M/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||
Vulnerability Type: | CWE-264 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2006-7108 Source: CCN Type: RHSA-2007-0235 Low: util-linux security and bug fix update Source: SECUNIA Type: Vendor Advisory 25098 Source: SECUNIA Type: Vendor Advisory 25530 Source: SECUNIA Type: Vendor Advisory 25692 Source: CCN Type: SA25935 Avaya Products util-linux Security Issue Source: SECUNIA Type: Vendor Advisory 25935 Source: CONFIRM Type: UNKNOWN http://support.avaya.com/elmodocs2/security/ASA-2007-252.htm Source: CCN Type: ASA-2007-252 util-linux security and bug fix update (RHSA-2007-0235) Source: CCN Type: The The Linux Kernel Archives Web site Index of /pub/linux/utils/util-linux/testing Source: MANDRIVA Type: UNKNOWN MDKSA-2007:111 Source: REDHAT Type: UNKNOWN RHSA-2007:0235 Source: BID Type: UNKNOWN 24321 Source: CCN Type: BID-24321 Util-linux Login Security Bypass Vulnerability Source: CCN Type: Red Hat Bugzilla Bug 177331 CVE-2006-7108 login omits pam_acct_mgmt & pam_chauthtok when authentication is skipped. Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=177331 Source: XF Type: UNKNOWN utillinux-pamacctmgmt-security-bypass(34844) Source: CONFIRM Type: UNKNOWN https://issues.rpath.com/browse/RPL-1359 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9689 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |