Multiple directory traversal vulnerabilities in pamtimestamp.c in the pamtimestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAMRUSER value to the getruser function or (2) PAMTTY value to the checktty function, which is used by the formattimestampname function.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "1.1.8-1ubuntu2.1", "binary_name": "libpam-cracklib" }, { "binary_version": "1.1.8-1ubuntu2.1", "binary_name": "libpam-cracklib-dbgsym" }, { "binary_version": "1.1.8-1ubuntu2.1", "binary_name": "libpam-doc" }, { "binary_version": "1.1.8-1ubuntu2.1", "binary_name": "libpam-modules" }, { "binary_version": "1.1.8-1ubuntu2.1", "binary_name": "libpam-modules-bin" }, { "binary_version": "1.1.8-1ubuntu2.1", "binary_name": "libpam-modules-bin-dbgsym" }, { "binary_version": "1.1.8-1ubuntu2.1", "binary_name": "libpam-modules-dbgsym" }, { "binary_version": "1.1.8-1ubuntu2.1", "binary_name": "libpam-runtime" }, { "binary_version": "1.1.8-1ubuntu2.1", "binary_name": "libpam0g" }, { "binary_version": "1.1.8-1ubuntu2.1", "binary_name": "libpam0g-dbgsym" }, { "binary_version": "1.1.8-1ubuntu2.1", "binary_name": "libpam0g-dev" } ] }