OpenSSH PAM会话逃避漏洞

漏洞信息详情

OpenSSH PAM会话逃避漏洞

漏洞简介

OpenSSH 2.9及其早期版本在无pty的命令时不初始化Pluggable Authentication Module (PAM)。本地用户可以利用该漏洞绕过pam.d中的资源限制(rlimits)设置。

漏洞公告

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源:US-CERT Vulnerability Note: VU#797027
名称: VU#797027
链接:http://www.kb.cert.org/vuls/id/797027

来源: XF
名称: openssh-rsh-bypass-pam(6757)
链接:http://xforce.iss.net/xforce/xfdb/6757

来源: BID
名称: 2917
链接:http://www.securityfocus.com/bid/2917

来源: BUGTRAQ
名称: 20010619 pam session
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=99324968918628&w=2

来源: BUGTRAQ
名称: 20010619 pam session
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=99324968918628&w=2

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享