CVE-2016-4422
Published: 6 May 2016
The pam_sm_authenticate function in pam_sshauth.c in libpam-sshauth might allow context-dependent attackers to bypass authentication or gain privileges via a system user account.
Notes
Author | Note |
---|---|
sbeattie | simplified fix in oss-security posting |
Priority
Status
Package | Release | Status |
---|---|---|
libpam-sshauth Launchpad, Ubuntu, Debian |
upstream |
Released
(0.4.1-2)
|
precise |
Ignored
(end of life)
|
|
trusty |
Released
(0.3.1-1deb8u1build0.14.04.1)
|
|
wily |
Released
(0.3.1-1ubuntu0.15.10.1)
|
|
xenial |
Released
(0.3.1-1ubuntu2)
|
|
yakkety |
Not vulnerable
(0.4.1-2)
|
|
zesty |
Not vulnerable
(0.4.1-2)
|
|
Patches: upstream: https://bazaar.launchpad.net/~ltsp-upstream/ltsp/libpam-sshauth/revision/114 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |