Vulnerability Description
The default configuration of su in /etc/pam.d/su in GNU coreutils 5.2.1 allows local users to gain the privileges of a (1) locked or (2) expired account by entering the account name on the command line, related to improper use of the pam_succeed_if.so module.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Coreutils | 5.2.1 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2008-0780.html
- http://secunia.com/advisories/31225Vendor Advisory
- http://securitytracker.com/id?1020552
- http://www.securityfocus.com/bid/30363
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43993
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://rhn.redhat.com/errata/RHSA-2008-0780.html
- http://secunia.com/advisories/31225Vendor Advisory
- http://securitytracker.com/id?1020552
- http://www.securityfocus.com/bid/30363
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43993
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
FAQ
What is CVE-2008-1946?
CVE-2008-1946 is a vulnerability with a CVSS score of 4.4 (MEDIUM). The default configuration of su in /etc/pam.d/su in GNU coreutils 5.2.1 allows local users to gain the privileges of a (1) locked or (2) expired account by entering the account name on the command lin...
How severe is CVE-2008-1946?
CVE-2008-1946 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-1946?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Coreutils.