First published: Mon Oct 26 2020(Updated: )
libtac in pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-random/predictable session_id.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pam Tacplus Project Pam Tacplus | <=1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27743 is a vulnerability in libtac, a component of pam_tacplus, versions up to and including 1.5.1.
CVE-2020-27743 has a severity value of 9.8 (Critical).
If you are using pam_tacplus version up to and including 1.5.1, and RAND_bytes()/RAND_pseudo_bytes() fails, this vulnerability could lead to the use of a non-random or predictable session_id, compromising the security of your system.
Yes, you can fix CVE-2020-27743 by updating to a version of pam_tacplus that is higher than 1.5.1.
You can find more information about CVE-2020-27743 on the GitHub pull request (https://github.com/kravietz/pam_tacplus/pull/163) and on the RFC publication (https://tools.ietf.org/html/rfc8907).