pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because, in the context of PAM code running as root, it mishandles usersfile access, such as by calling fchown in the presence of a symlink.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-5784-1 oath-toolkit security update
Ubuntu USN Ubuntu USN USN-7059-1 OATH Toolkit vulnerability
Ubuntu USN Ubuntu USN USN-7059-2 OATH Toolkit vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.00088}

epss

{'score': 0.00067}


Fri, 27 Jun 2025 11:30:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:ceph_storage:8.1::el9

Thu, 08 May 2025 23:45:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:ceph_storage:7.1::el8

Tue, 29 Apr 2025 00:15:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:ceph_storage:6.1::el8

Tue, 08 Apr 2025 11:45:00 +0900

Type Values Removed Values Added
First Time appeared Redhat
Redhat ceph Storage
CPEs cpe:/a:redhat:ceph_storage:8.0::el9
Vendors & Products Redhat
Redhat ceph Storage

Fri, 22 Nov 2024 21:00:00 +0900


Thu, 10 Oct 2024 06:15:00 +0900

Type Values Removed Values Added
First Time appeared Nongnu
Nongnu oath Toolkit
CPEs cpe:2.3:a:nongnu:oath_toolkit:*:*:*:*:*:*:*:*
Vendors & Products Nongnu
Nongnu oath Toolkit
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 09 Oct 2024 14:15:00 +0900

Type Values Removed Values Added
Description A vulnerability was found in a PAM module, the oath-toolkit. The module gained a feature that allowed placing the OTP state file, called the usersfile, in the home directory of the to-be-authenticated user. The PAM module performed unsafe file operations in the users' home directories. Since PAM stacks typically run as root, this flaw allows a malicious user to jeopardize an environment. pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because, in the context of PAM code running as root, it mishandles usersfile access, such as by calling fchown in the presence of a symlink.
References

Tue, 08 Oct 2024 11:30:00 +0900

Type Values Removed Values Added
Description No description is available for this CVE. A vulnerability was found in a PAM module, the oath-toolkit. The module gained a feature that allowed placing the OTP state file, called the usersfile, in the home directory of the to-be-authenticated user. The PAM module performed unsafe file operations in the users' home directories. Since PAM stacks typically run as root, this flaw allows a malicious user to jeopardize an environment.

Sat, 05 Oct 2024 10:30:00 +0900

Type Values Removed Values Added
Description No description is available for this CVE.
Title oath-toolkit: Local root exploit in a PAM module
Weaknesses CWE-22
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}

threat_severity

Important


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-10-18T03:08:08.622Z

Reserved: 2024-09-20T00:00:00

Link: CVE-2024-47191

cve-icon Vulnrichment

Updated: 2024-10-18T03:08:08.622Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-09T05:15:13.420

Modified: 2024-11-21T09:39:30.360

Link: CVE-2024-47191

cve-icon Redhat

Severity : Important

Publid Date: 2024-10-04T00:00:00Z

Links: CVE-2024-47191 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses