First published: Mon Jul 28 2008(Updated: )
The default configuration of su in /etc/pam.d/su in GNU coreutils 5.2.1 allows local users to gain the privileges of a (1) locked or (2) expired account by entering the account name on the command line, related to improper use of the pam_succeed_if.so module.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU coreutils | =5.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1946 is considered to have a moderate severity rating due to its potential to allow local users to escalate privileges.
To fix CVE-2008-1946, you should update GNU coreutils to a version later than 5.2.1 where this vulnerability is addressed.
CVE-2008-1946 affects local users of systems running GNU coreutils version 5.2.1 or earlier.
CVE-2008-1946 allows local users to gain privileges of locked or expired accounts due to improper configuration in PAM.
A possible workaround for CVE-2008-1946 involves modifying the PAM configuration to restrict the use of the 'su' command.