Vulnerability Description
The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Shadow | 4.4 |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877374Mailing ListVendor Advisory
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957ExploitMailing ListVendor Advisory
- https://lists.debian.org/debian-lts-announce/2021/03/msg00020.htmlMailing ListVendor Advisory
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877374Mailing ListVendor Advisory
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957ExploitMailing ListVendor Advisory
- https://lists.debian.org/debian-lts-announce/2021/03/msg00020.htmlMailing ListVendor Advisory
FAQ
What is CVE-2017-20002?
CVE-2017-20002 is a vulnerability with a CVSS score of 7.8 (HIGH). The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are ...
How severe is CVE-2017-20002?
CVE-2017-20002 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-20002?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Shadow, Debian Debian Linux.