668
VMScore

CVE-2020-27743

Published: 26/10/2020 Updated: 02/11/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

libtac in pam_tacplus up to and including 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-random/predictable session_id.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pam tacplus project pam tacplus

Vendor Advisories

Debian Bug report logs - #973250 libpam-tacplus: CVE-2020-27743 Package: src:libpam-tacplus; Maintainer for src:libpam-tacplus is Jeroen Nijhof <jeroen@jeroennijhofnl>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 27 Oct 2020 20:39:06 UTC Severity: important Tags: fixed-upstream, security, upstre ...