First published: Sun Mar 04 2007(Updated: )
login in util-linux-2.12a skips pam_acct_mgmt and chauth_tok when authentication is skipped, such as when a Kerberos krlogin session has been established, which might allow users to bypass intended access policies that would be enforced by pam_acct_mgmt and chauth_tok.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
util-linux | =2.12a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-7108 is considered medium, as it allows users to bypass access policies due to incorrect PAM handling.
To fix CVE-2006-7108, upgrade to a patched version of util-linux that addresses the PAM issues.
The affected software includes util-linux version 2.12a.
CVE-2006-7108 can be exploited through Kerberos krlogin sessions, allowing unauthorized access.
The consequences of CVE-2006-7108 include potential unauthorized access to systems, violating intended security policies.