First published: Thu Apr 10 2014(Updated: )
Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the check_tty function, which is used by the format_timestamp_name function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/pam | 1.4.0-9+deb11u1 1.5.2-6+deb12u1 1.5.3-7 | |
Linux-PAM | =1.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2583 is classified as a medium severity vulnerability due to its potential to allow local users to bypass authentication.
The vulnerability affects local users of Linux-PAM version 1.1.8, specifically those utilizing the pam_timestamp module.
To fix CVE-2014-2583, update Linux-PAM to version 1.4.0-9+deb11u1, 1.5.2-6+deb12u1, or 1.5.3-7.
CVE-2014-2583 can be exploited through directory traversal attacks that allow an attacker to create arbitrary files or bypass authentication.
The exploit mechanism involves using dot-dot notation in the PAM_RUSER or PAM_TTY values to manipulate the get_ruser function.