Privilege Escalation in GNU Coreutils by Improper PAM Configuration
CVE-2008-1946
Currently unrated
Summary
The default configuration of the 'su' command in the PAM (Pluggable Authentication Modules) settings of GNU Coreutils 5.2.1 allows local users to impersonate locked or expired accounts simply by entering the account name in the command line. This misconfiguration stems from the improper use of the pam_succeed_if.so module, which can lead to unauthorized privilege escalation and potential security breaches. Users should review their PAM configurations to mitigate this risk.
References
Timeline
Vulnerability published
Vulnerability Reserved