vendor:
Pluggable Authentication Modules (PAM) and unix_scheme
by:
SecurityFocus
7.2
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Pluggable Authentication Modules (PAM) and unix_scheme
Affected Version From: 5.4 and 5.3
Affected Version To: 5.5.1, 5.5.1_x86, 5.5, 5.5_x86
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: SunOS
2001
Buffer Overflow in Pluggable Authentication Modules (PAM) and unix_scheme
There is a buffer overflow condition on arguments in Pluggable Authentication Modules (PAM) and unix_scheme (5.4 and 5.3). Therefore, an unauthorized user could exploit this vulnerability via the passwd program to gain root access. Under SunOS 5.5.1, 5.5.1_x86, 5.5, 5.5_x86, yppasswd and nispasswd are hard links to the passwd program and therefore are also vulnerable. Under SunOS 5.4 and 5.3, passwd, yppasswd, and nispasswd are separate programs but they dynamically link unix_scheme and are affected.
Mitigation:
Upgrade to the latest version of Pluggable Authentication Modules (PAM) and unix_scheme.