A local user can bypass the OpenAFS PAG (Process Authentication Group)
throttling mechanism in Unix clients, allowing the user to create a PAG using
an existing id number, effectively joining the PAG and letting the user steal
the credentials in that PAG.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://openafs.org/pages/security/OPENAFS-SA-2024-001.txt |
History
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Tue, 19 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Thu, 14 Nov 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG. | |
Title | A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix client | |
Weaknesses | CWE-190 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: fedora
Published: 2024-11-14T19:07:50.492Z
Updated: 2024-11-21T16:11:52.222Z
Reserved: 2024-10-25T18:51:34.290Z
Link: CVE-2024-10394
Vulnrichment
Updated: 2024-11-19T15:59:36.199Z
NVD
Status : Awaiting Analysis
Published: 2024-11-14T20:15:20.777
Modified: 2024-11-21T17:15:09.443
Link: CVE-2024-10394
Redhat
No data.