First published: Tue Nov 24 2020(Updated: )
A flaw was found in Linux-Pam in the way it handle empty passwords for non-existing users. When the user doesn't exist PAM try to authenticate with root and in the case of an empty password it successfully authenticate. Reference: <a href="https://github.com/linux-pam/linux-pam/issues/284">https://github.com/linux-pam/linux-pam/issues/284</a> Upstream patch: <a href="https://github.com/linux-pam/linux-pam/pull/300">https://github.com/linux-pam/linux-pam/pull/300</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pam | <1.5.1 | 1.5.1 |
Linux-PAM | >=1.5.0<1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw in Linux-Pam is CVE-2020-27780.
CVE-2020-27780 has a severity rating of 9.8 (Critical).
This vulnerability in Linux-Pam allows an attacker to authenticate with root privileges using an empty password for non-existing users.
Versions of Linux-Pam prior to 1.5.1 are affected by CVE-2020-27780.
To fix CVE-2020-27780, update Linux-Pam to version 1.5.1 or later.