5.6
CVSSv3

CVE-2016-3176

Published: 31/01/2017 Updated: 07/02/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.6 | Impact Score: 3.4 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Salt prior to 2015.5.10 and 2015.8.x prior to 2015.8.8, when PAM external authentication is enabled, allows malicious users to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient.

Vulnerable Product Search on Vulmon Subscribe to Product

saltstack salt 2015.8.7

saltstack salt 2015.8.5

saltstack salt 2015.8.4

saltstack salt 2015.8.3

saltstack salt 2015.8.1

saltstack salt

saltstack salt 2015.8.2

saltstack salt 2015.8.0

Vendor Advisories

Debian Bug report logs - #819184 salt: CVE-2016-3176: insecure configuration of PAM external authentication service Package: src:salt; Maintainer for src:salt is Debian Salt Team <pkg-salt-team@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 24 Mar 2016 16:15:02 UTC Severity ...
Salt before 2015510 and 20158x before 201588, when PAM external authentication is enabled, allows attackers to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient ...