CVE-2024-10394

A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG.
CVSS

No CVSS.

Configurations

No configuration.

History

21 Nov 2024, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 0.0
v2 : unknown
v3 : unknown

19 Nov 2024, 16:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 0.0

15 Nov 2024, 13:58

Type Values Removed Values Added
Summary
  • (es) Un usuario local puede eludir el mecanismo de limitación de PAG (grupo de autenticación de procesos) de OpenAFS en clientes Unix, lo que le permite crear un PAG utilizando un número de identificación existente, uniéndose efectivamente al PAG y permitiendo al usuario robar las credenciales en ese PAG.

14 Nov 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-14 20:15

Updated : 2024-11-21 17:15


NVD link : CVE-2024-10394

Mitre link : CVE-2024-10394

CVE.ORG link : CVE-2024-10394


JSON object : View

Products Affected

No product.

CWE
CWE-190

Integer Overflow or Wraparound