CVE-2008-4313
Published Nov 27, 2008
Last updated 7 years ago
Overview
- Description
- A certain Red Hat patch for tog-pegasus in OpenGroup Pegasus 2.7.0 does not properly configure the PAM tty name, which allows remote authenticated users to bypass intended access restrictions and send requests to OpenPegasus WBEM services.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6
- Impact score
- 6.4
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40D71CBC-D365-4710-BAB5-8A1159F35E41" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13B6DE5F-3143-4C63-8D8D-4679CF0F9DC8" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:openpegasus:openpegasus_wbem:2.7.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D47969DA-1CAD-4547-9BF6-85EDA8710B89" } ], "operator": "OR" } ], "operator": "AND" } ]