CVE-2018-17953Improper Access Control in PAM

Severity
8.1HIGHNVD
EPSS
0.4%
top 37.15%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 27
Latest updateMay 13

Description

A incorrect variable in a SUSE specific patch for pam_access rule matching in PAM 1.3.0 in openSUSE Leap 15.0 and SUSE Linux Enterprise 15 could lead to pam_access rules not being applied (fail open).

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages3 packages

CVEListV5suse/pam1.3.01.3.0 before 2018-11-30
NVDkernel/linux-pam1.3.0
debiandebian/pam

🔴Vulnerability Details

1
GHSA
GHSA-wwc4-7rwv-m5ch: A incorrect variable in a SUSE specific patch for pam_access rule matching in PAM 12022-05-13

📋Vendor Advisories

2
Red Hat
pam: pam_access.so doesn't properly handle ip addresses and subnets filtering2018-11-11
Debian
CVE-2018-17953: pam - A incorrect variable in a SUSE specific patch for pam_access rule matching in PA...2018

💬Community

2
Bugzilla
CVE-2018-17953 pam: pam_access.so doesn't properly handle ip addresses and subnets filtering2018-11-22
Bugzilla
CVE-2018-17953 pam: pam_access.so doesn't properly handle ip addresses and subnets filtering [fedora-all]2018-11-22
CVE-2018-17953 — Improper Access Control in Suse PAM | cvebase