First published: Mon Oct 08 2001(Updated: )
The PAM implementation in /bin/login of the util-linux package before 2.11 causes a password entry to be rewritten across multiple PAM calls, which could provide the credentials of one user to a different user, when used in certain PAM modules such as pam_limits.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Util-linux | =2.10s | |
Util-linux | =2.11f | |
Util-linux | =2.11h | |
Util-linux | =2.11i | |
Util-linux | =2.11k |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1147 is considered a high severity vulnerability due to its potential impact on user credential exposure.
To fix CVE-2001-1147, update the util-linux package to version 2.11l or newer.
CVE-2001-1147 affects the PAM implementation in the /bin/login of the util-linux package before version 2.11l.
CVE-2001-1147 primarily impacts Unix-like operating systems that utilize the vulnerable versions of the util-linux package.
Yes, CVE-2001-1147 can potentially allow one user to access another user's credentials, posing a significant security risk.