First published: Thu Nov 14 2024(Updated: )
A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG.
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
npm |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-10394 is considered high due to its potential for local users to steal credentials through a PAG bypass.
To fix CVE-2024-10394, users should update to the latest version of OpenAFS that includes the necessary security patches.
CVE-2024-10394 affects local users on Unix clients running vulnerable versions of OpenAFS.
The impact of CVE-2024-10394 is that it allows attackers to create a PAG with an existing id number, potentially leading to credential theft.
Currently, there are no documented workarounds for CVE-2024-10394; updating to a secure version is recommended.