7.8
CVSSv3

CVE-2019-16729

Published: 24/09/2019 Updated: 27/02/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

pam-python prior to 1.0.7-1 has an issue in regard to the default environment variable handling of Python, which could allow for local root escalation in certain PAM setups.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pam-python project pam-python

debian debian linux 8.0

debian debian linux 9.0

debian debian linux 10.0

canonical ubuntu linux 18.04

canonical ubuntu linux 16.04

Vendor Advisories

Debian Bug report logs - #942514 pam-python: CVE-2019-16729: local root escalation Package: src:pam-python; Maintainer for src:pam-python is Russell Stuart <russell-debian@stuartidau>; Reported by: Hugo Lefeuvre <hle@debianorg> Date: Thu, 17 Oct 2019 11:42:02 UTC Severity: important Tags: fixed-upstream, security, ...
Malte Kraus discovered that libpam-python, a PAM module allowing PAM modules to be written in Python, didn't sanitise environment variables which could result in local privilege escalation if used with a setuid binary For the oldstable distribution (stretch), this problem has been fixed in version 106-11+deb9u1 For the stable distribution (bus ...

Github Repositories

CVE-2019-16729 trickery and beyond Intro When I was reading an article about customized PAM setups, pam_python crossed my way Having done quite some Python code reviews in critical places and knowing that its very hard to secure privileged Python code, I wondered how secure it could be Being a C and C++ coder with passion and hearing a lot of unsolicated langsec rantings for