CVE-2008-1946

high

Description

The default configuration of su in /etc/pam.d/su in GNU coreutils 5.2.1 allows local users to gain the privileges of a (1) locked or (2) expired account by entering the account name on the command line, related to improper use of the pam_succeed_if.so module.

References

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10029

https://exchange.xforce.ibmcloud.com/vulnerabilities/43993

http://www.securityfocus.com/bid/30363

http://securitytracker.com/id?1020552

http://secunia.com/advisories/31225

http://rhn.redhat.com/errata/RHSA-2008-0780.html

Details

Source: Mitre, NVD

Published: 2008-07-28

Updated: 2017-09-29

Risk Information

CVSS v2

Base Score: 4.4

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High