Multiple directory traversal vulnerabilities in pamtimestamp.c in the pamtimestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAMRUSER value to the getruser function or (2) PAMTTY value to the checktty function, which is used by the formattimestampname function.
{ "binaries": [ { "binary_name": "libpam-cracklib", "binary_version": "1.1.8-1ubuntu2.1" }, { "binary_name": "libpam-cracklib-dbgsym", "binary_version": "1.1.8-1ubuntu2.1" }, { "binary_name": "libpam-doc", "binary_version": "1.1.8-1ubuntu2.1" }, { "binary_name": "libpam-modules", "binary_version": "1.1.8-1ubuntu2.1" }, { "binary_name": "libpam-modules-bin", "binary_version": "1.1.8-1ubuntu2.1" }, { "binary_name": "libpam-modules-bin-dbgsym", "binary_version": "1.1.8-1ubuntu2.1" }, { "binary_name": "libpam-modules-dbgsym", "binary_version": "1.1.8-1ubuntu2.1" }, { "binary_name": "libpam-runtime", "binary_version": "1.1.8-1ubuntu2.1" }, { "binary_name": "libpam0g", "binary_version": "1.1.8-1ubuntu2.1" }, { "binary_name": "libpam0g-dbgsym", "binary_version": "1.1.8-1ubuntu2.1" }, { "binary_name": "libpam0g-dev", "binary_version": "1.1.8-1ubuntu2.1" } ], "availability": "No subscription required", "ubuntu_priority": "low" }