Article 6R7QH oath-toolkit: privilege escalation in pam_oath.so (SUSE Security Team Blog)

oath-toolkit: privilege escalation in pam_oath.so (SUSE Security Team Blog)

by
jzb
from LWN.net on (#6R7QH)

The SUSE Security Team Blog has a detailedreport on its discovery of a privilege escalation in theoath-toolkit,which provides libraries and utilities for managing one-time password(OTP) authentication.

Fellow SUSE engineer Fabian Vogt approached our Security Team aboutthe project's PAM module. A couple of years ago, the module gained afeature which allows to place the OTP state file (called usersfile) inthe home directory of the to-be-authenticated user. Fabian noticedthat the PAM module performs unsafe file operations in users' homedirectories. Since PAM stacks typically run as root, this can easilycause security issues.

External Content
Source RSS or Atom Feed
Feed Location http://lwn.net/headlines/rss
Feed Title LWN.net
Feed Link https://lwn.net/
Reply 0 comments