CVE-2018-17953
Published: 27 November 2018
A incorrect variable in a SUSE specific patch for pam_access rule matching in PAM 1.3.0 in openSUSE Leap 15.0 and SUSE Linux Enterprise 15 could lead to pam_access rules not being applied (fail open).
Notes
Author | Note |
---|---|
ebarretto | Issue was introduced by SUSE specific patch. |
Priority
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.1 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17953
- https://bugzilla.novell.com/show_bug.cgi?id=1115640
- https://build.opensuse.org/package/view_file/Linux-PAM/pam/pam-hostnames-in-access_conf.patch
- https://build.opensuse.org/package/view_file/Linux-PAM/pam/use-correct-IP-address.patch
- NVD
- Launchpad
- Debian