#VU71525 Incorrect authorization in linux-pam


Published: 2023-01-25 | Updated: 2023-05-26

Vulnerability identifier: #VU71525

Vulnerability risk: Medium

CVSSv3.1: 6.2 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-28321

CWE-ID: CWE-863

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
linux-pam
Other software / Other software solutions

Vendor: git.kernel.org

Description

The vulnerability allows a remote attacker to bypass authorization process.

The vulnerability exists due to an error within the pam_access.so module in Linux-PAM package, which does not correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS.  A remote attacker can bypass authorization process and login to the system via SSH from IP addresses that were not allowed to connect from.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

linux-pam: 1.0.0 - 1.5.1


External links
http://bugzilla.suse.com/show_bug.cgi?id=1197654
http://github.com/linux-pam/linux-pam/pull/447
http://tanzu.vmware.com/security/usn-5825-2


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability