CVE-2008-2516

NameCVE-2008-2516
Descriptionpam_sm_authenticate in pam_pgsql.c in libpam-pgsql 0.6.3 does not properly consider operator precedence when evaluating the success of a pam_get_pass function call, which allows local users to gain privileges via a SIGINT signal when this function is executing, as demonstrated by a CTRL-C sequence at a sudo password prompt in an "auth sufficient pam_pgsql.so" configuration.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs481970

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pam-pgsql (PTS)jessie, stretch0.7.3.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pam-pgsqlsourceetch(not affected)
pam-pgsqlsource(unstable)0.6.3-2medium481970

Notes

[etch] - pam-pgsql <not-affected> (Vulnerable code not present)
pam_pgsql is not configured as "sufficient" in Debian default configuration

Search for package or bug name: Reporting problems