Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-10963
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Pam: improper hostname interpretation in pam_access leads to access control bypass
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
认证机制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Red Hat Enterprise Linux 7 授权问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Red Hat Enterprise Linux 7是美国红帽(Red Hat)公司的一套面向企业用户的Linux操作系统。 Red Hat Enterprise Linux 7存在授权问题漏洞,该漏洞源于对access.conf中被解释为主机名的令牌处理不当,允许攻击者通过伪造主机名来绕过访问限制。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Red HatRed Hat Enterprise Linux 8 0:1.3.1-36.el8_10 ~ * cpe:/o:redhat:enterprise_linux:8::baseos
Red HatRed Hat Enterprise Linux 9 0:1.5.1-22.el9_5 ~ * cpe:/o:redhat:enterprise_linux:9::baseos
Red HatRed Hat Enterprise Linux 9 0:1.5.1-22.el9_5 ~ * cpe:/o:redhat:enterprise_linux:9::baseos
Red HatRed Hat Enterprise Linux 9.4 Extended Update Support 0:1.5.1-23.el9_4 ~ * cpe:/o:redhat:rhel_eus:9.4::baseos
Red HatRed Hat OpenShift Container Platform 4.16 416.94.202411261619-0 ~ * cpe:/a:redhat:openshift:4.16::el9
Red HatRed Hat OpenShift Container Platform 4.17 417.94.202411261220-0 ~ * cpe:/a:redhat:openshift:4.17::el9
Red HatRed Hat OpenShift AI 2.16 sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644 ~ * cpe:/a:redhat:openshift_ai:2.16::el8
Red HatRed Hat Enterprise Linux 10-cpe:/o:redhat:enterprise_linux:10
Red HatRed Hat Enterprise Linux 6-cpe:/o:redhat:enterprise_linux:6
Red HatRed Hat Enterprise Linux 7-cpe:/o:redhat:enterprise_linux:7
II. Public POCs for CVE-2024-10963
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-10963
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-10963

No comments yet


Leave a comment