Weak permissions on the configuration file in the PAM module in Grommunio Gromox 0.5 through 1.x before 1.28 allow a local unprivileged user in the gromox group to have the PAM stack execute arbitrary code upon loading the Gromox PAM module.
During installation, installed file permissions are set to allow anyone to modify those files.
Link | Tags |
---|---|
https://bugzilla.suse.com/show_bug.cgi?id=1201949 | issue tracking exploit third party advisory |
http://www.openwall.com/lists/oss-security/2022/08/04/1 | third party advisory mailing list |