CVE-2009-0887

Severity

65%

Complexity

27%

Confidentiality

165%

Integer signedness error in the _pam_StrTok function in libpam/pam_misc.c in Linux-PAM (aka pam) 1.0.3 and earlier, when a configuration file contains non-ASCII usernames, might allow remote attackers to cause a denial of service, and might allow remote authenticated users to obtain login access with a different user's non-ASCII username, via a login attempt.

Integer signedness error in the _pam_StrTok function in libpam/pam_misc.c in Linux-PAM (aka pam) 1.0.3 and earlier, when a configuration file contains non-ASCII usernames, might allow remote attackers to cause a denial of service, and might allow remote authenticated users to obtain login access with a different user's non-ASCII username, via a login attempt.

CVSS 2.0 Base Score 6.6. CVSS Attack Vector: local. CVSS Attack Complexity: medium. CVSS Vector: (AV:L/AC:M/Au:S/C:C/I:C/A:C).

Overview

Type

Linux-PAM

First reported 15 years ago

2009-03-12 15:20:00

Last updated 6 years ago

2019-01-03 15:01:00

Affected Software

Linux-PAM 0.99.1.0

0.99.1.0

Linux-PAM 0.99.2.0

0.99.2.0

Linux-PAM 0.99.2.1

0.99.2.1

Linux-PAM 0.99.3.0

0.99.3.0

Linux-PAM 0.99.4.0

0.99.4.0

Linux-PAM 0.99.5.0

0.99.5.0

Linux-PAM 0.99.6.0

0.99.6.0

Linux-PAM 0.99.6.1

0.99.6.1

Linux-PAM 0.99.6.2

0.99.6.2

Linux-PAM 0.99.6.3

0.99.6.3

Linux-PAM 0.99.7.0

0.99.7.0

Linux-PAM 0.99.7.1

0.99.7.1

Linux-PAM 0.99.8.0

0.99.8.0

Linux-PAM 0.99.8.1

0.99.8.1

Linux-PAM 0.99.9.0

0.99.9.0

Linux-PAM 0.99.10.0

0.99.10.0

Linux-PAM 1.0.0

1.0.0

Linux-PAM 1.0.1

1.0.1

Linux-PAM 1.0.2

1.0.2

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.