CVE-2019-16729
Published: 24 September 2019
pam-python before 1.0.7-1 has an issue in regard to the default environment variable handling of Python, which could allow for local root escalation in certain PAM setups.
From the Ubuntu Security Team
Malte Kraus discovered that Pam-python mishandled certain environment variables. A local attacker could potentially use this vulnerability to execute programs as root.
Priority
Status
Package | Release | Status |
---|---|---|
pam-python Launchpad, Ubuntu, Debian |
bionic |
Released
(1.0.6-1.1+deb10u1build0.18.04.1)
|
disco |
Ignored
(end of life)
|
|
eoan |
Ignored
(end of life)
|
|
focal |
Not vulnerable
(1.0.7-1)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Released
(1.0.4-1.1+deb8u1build0.16.04.1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16729
- https://bugzilla.suse.com/show_bug.cgi?id=1150510#c1
- https://sourceforge.net/p/pam-python/code/ci/0247ab687b4347cc52859ca461fb0126dd7e2ebe/
- https://tracker.debian.org/news/1066790/accepted-pam-python-107-1-source-amd64-all-into-unstable/
- https://ubuntu.com/security/notices/USN-4552-1
- https://ubuntu.com/security/notices/USN-4552-2
- https://ubuntu.com/security/notices/USN-4552-3
- NVD
- Launchpad
- Debian