vulnerability
Red Hat: CVE-2024-10963: pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:H/Au:N/C:C/I:C/A:N) | 2024-11-07 | 2025-02-10 | 2025-02-10 |
Severity
7
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:N)
Published
2024-11-07
Added
2025-02-10
Modified
2025-02-10
Description
A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.
Solution(s)
redhat-upgrade-pamredhat-upgrade-pam-debuginforedhat-upgrade-pam-debugsourceredhat-upgrade-pam-develredhat-upgrade-pam-docs

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.