Published: 18/12/2020 Updated: 28/12/2020
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A flaw was found in Linux-Pam in versions before 1.5.1 in the way it handle empty passwords for non-existing users. When the user doesn't exist PAM try to authenticate with root and in the case of an empty password it successfully authenticate.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux-pam linux-pam

Vendor Advisories

Arch Linux Security Advisory ASA-202012-13 ========================================== Severity: High Date : 2020-12-09 CVE-ID : CVE-2020-27780 Package : pam Type : authentication bypass Remote : No Link : securityarchlinuxorg/AVG-1297 Summary ======= The package pam before version 150-2 is vulnerable to authentication bypa ...
An authentication bypass issue was found in pam 150 Nonexistent users could authenticate if the root password was empty ...

Mailing Lists

Hi, (via IRC, spotted by Foxboron) PAM 150 had a potential auth bypass, if a user did not exist and the root password was empty (but root locked down) The reporters usecase was spammers pretending to be unknown users with a PAM enabled dovecot This issue affected only pam 150 News entry: githubcom/linux-pam/linux-pam/commit/28b ...