First published: Thu Nov 07 2024(Updated: )
A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pam pam_access |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-10963 is classified as high due to its potential for unauthorized access.
To fix CVE-2024-10963, you should update the pam_access configuration to prevent misinterpretation of certain rules as hostnames.
CVE-2024-10963 affects systems using pam_access with vulnerable configuration settings.
CVE-2024-10963 is a configuration vulnerability that enables unauthorized access through hostname impersonation.
Yes, CVE-2024-10963 can potentially be exploited remotely if an attacker knows how to manipulate the hostname configurations.