SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Security)  >   libpam-pgsql Vendors:   libpam-pgsql
libpam-pgsql Bug Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1020111
SecurityTracker URL:  http://securitytracker.com/id/1020111
CVE Reference:   CVE-2008-2516   (Links to External Site)
Updated:  Jun 6 2008
Original Entry Date:  May 27 2008
Impact:   Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): prior to 0.6.4
Description:   A vulnerability was reported in libpam-pgsql. A local user can obtain elevated privileges on the target system.

A local user can invoke sudo and enter the Control and C keys to bypass authentication and execute the sudo command.

Impact:   A local user can bypass authentication to potentially gain elevated privileges on the target system.
Solution:   The vendor has issued a fixed version (0.6.4), available at:

http://sourceforge.net/project/showfiles.php?group_id=62198

The vendor's advisory is available at:

http://sourceforge.net/project/shownotes.php?release_id=601775

Vendor URL:  sourceforge.net/projects/pam-pgsql/ (Links to External Site)
Cause:   State error
Underlying OS:   Linux (Any), UNIX (Any)

Message History:   None.


 Source Message Contents

Date:  Tue, 27 May 2008 00:13:50 -0400
Subject:  libpam-pgsql


http://sourceforge.net/project/shownotes.php?release_id=601775

> Changes: Critical security update. Change discussed in http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=481970 Big thanks to Debian Security.

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC