A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.
{ "binaries": [ { "binary_name": "libpam-modules", "binary_version": "1.5.3-5ubuntu5.4" }, { "binary_name": "libpam-modules-bin", "binary_version": "1.5.3-5ubuntu5.4" }, { "binary_name": "libpam-runtime", "binary_version": "1.5.3-5ubuntu5.4" }, { "binary_name": "libpam0g", "binary_version": "1.5.3-5ubuntu5.4" }, { "binary_name": "libpam0g-dev", "binary_version": "1.5.3-5ubuntu5.4" } ] }
{ "binaries": [ { "binary_name": "libpam-modules", "binary_version": "1.5.3-7ubuntu4.3" }, { "binary_name": "libpam-modules-bin", "binary_version": "1.5.3-7ubuntu4.3" }, { "binary_name": "libpam-runtime", "binary_version": "1.5.3-7ubuntu4.3" }, { "binary_name": "libpam0g", "binary_version": "1.5.3-7ubuntu4.3" }, { "binary_name": "libpam0g-dev", "binary_version": "1.5.3-7ubuntu4.3" } ] }